Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 4 Sep 2008 12:24:22 -0400 (EDT)
From: "Steven M. Christey" <>
Subject: Re: [oCERT-2008-014] WordNet stack and heap overflows

Notice how CVE treats these as all the same core type of issue, even
though the types of attack vectors are different (command line vs. env
variable) and the types of buffers are different (heap vs. stack).  The
basic programming error was the same regardless of where it occurred or
what it affected.

- Steve

Name: CVE-2008-3908
Status: Candidate
Reference: BUGTRAQ:20080901 [oCERT-2008-014] WordNet stack and heap overflows
Reference: URL:
Reference: MISC:http://
Reference: MISC:
Reference: MISC:
Reference: BID:30958
Reference: URL:
Reference: XF:wordnet-binsrch-search-bo(44851)
Reference: URL:
Reference: XF:wordnet-morph-search-bo(44848)
Reference: URL:
Reference: XF:wordnet-morphinit-bo(44849)
Reference: URL:
Reference: XF:wordnet-wninit-bo(44850)
Reference: URL:

Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow
context-dependent attackers to execute arbitrary code via (1) a long
argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or
(4) WNDBVERSION environment variable; or (5) a user-supplied
dictionary (aka data file).  NOTE: since WordNet itself does not run
with special privileges, this issue only crosses privilege boundaries
in cases such as when WordNet is invoked as a third party component.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.