SB2011123101 - Buffer overflow in GNU PLIB
Published: December 31, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2011-4620)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote attackers to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00015.html
- http://openwall.com/lists/oss-security/2011/12/21/2
- http://osvdb.org/77973
- http://secunia.com/advisories/47297
- http://secunia.com/advisories/51340
- http://www.exploit-db.com/exploits/18258/
- https://security.gentoo.org/glsa/201606-16