*** This bug is a security vulnerability *** You have been subscribed to a public security bug by Jamie Strandboge (jdstrand):
Binary package hint: wordnet Stack-based buffer overflow in the searchwn function in Wordnet 2.0, 2.1, and 3.0 might allow context-dependent attackers to execute arbitrary code via a long command line option. NOTE: this issue probably does not cross privilege boundaries except in cases in which Wordnet is used as a back end. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149 ** Affects: wordnet (Ubuntu) Importance: Undecided Assignee: Stefan Lesicnik (stefanlsd) Status: In Progress ** Affects: wordnet (Debian) Importance: Unknown Status: Fix Released -- [CVE-2008-2149] wordnet 2.0, 2.1, 3 affected by multiple buffer overflows https://bugs.launchpad.net/bugs/267067 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
