ID |
CVE-2008-3196
|
Summary |
skeleton.c in yacc does not properly handle reduction of a rule with an empty right hand side, which allows context-dependent attackers to cause an out-of-bounds stack access when the yacc stack pointer points to the end of the stack. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 7.8 (as of 27-11-2012 - 03:48) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
refmap
via4
|
mlist | - [openbsd-cvs] 20080708 CVS: cvs.openbsd.org: src
- [openbsd-cvs] 20080708 Re: CVS: cvs.openbsd.org: src
| secunia | 31073 | vupen | ADV-2008-2151 |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2008-07-17 | organization | Red Hat | statement | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-3196
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. |
|
Last major update |
27-11-2012 - 03:48 |
Published |
16-07-2008 - 18:41 |
Last modified |
27-11-2012 - 03:48 |