Stack-based buffer overflow in BOINC - CVE-2013-2298
Published: June 2, 2014 / Updated: August 20, 2020
BOINC
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a crafted XML file, related to the scheduler. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2013-2298
Sources
- http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html
- http://secunia.com/advisories/53192
- http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741
- http://www.openwall.com/lists/oss-security/2013/04/28/3
- http://www.securityfocus.com/bid/59539
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83931