*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Jamie Strandboge 
(jdstrand):

Binary package hint: wordnet

Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1,
and 3.0 might allow context-dependent attackers to execute arbitrary code
via a long command line option. NOTE: this issue probably does not cross
privilege boundaries except in cases in which Wordnet is used as a back
end.

References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149

** Affects: wordnet (Ubuntu)
     Importance: Undecided
     Assignee: Stefan Lesicnik (stefanlsd)
         Status: In Progress

** Affects: wordnet (Debian)
     Importance: Unknown
         Status: Fix Released

-- 
[CVE-2008-2149] wordnet 2.0, 2.1, 3 affected by multiple buffer overflows
https://bugs.launchpad.net/bugs/267067
You received this bug notification because you are a member of Ubuntu Bugs, 
which is a direct subscriber.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to