blob: 5e47c85efdb3b246f9383307993de7f0eb668ff6 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200905-02">
<title>Cscope: User-assisted execution of arbitrary code</title>
Multiple vulnerabilities in Cscope might allow for the remote execution of
arbitrary code.
<product type="ebuild">cscope</product>
<announced>May 24, 2009</announced>
<revised>May 24, 2009: 01</revised>
<package name="dev-util/cscope" auto="yes" arch="*">
<unaffected range="ge">15.7a</unaffected>
<vulnerable range="lt">15.7a</vulnerable>
Cscope is a developer's tool for browsing source code.
James Peach of Apple discovered a stack-based buffer overflow in
cscope's handling of long file system paths (CVE-2009-0148). Multiple
stack-based buffer overflows were reported in the putstring function
when processing an overly long function name or symbol in a source code
file (CVE-2009-1577).
<impact type="normal">
A remote attacker could entice a user to open a specially crafted
source file, possibly resulting in the remote execution of arbitrary
code with the privileges of the user running the application.
There is no known workaround at this time.
All Cscope users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.7a&quot;</code>
<uri link="">CVE-2009-0148</uri>
<uri link="">CVE-2009-1577</uri>
<metadata tag="requester" timestamp="Sun, 03 May 2009 18:51:15 +0000">
<metadata tag="submitter" timestamp="Mon, 04 May 2009 12:25:17 +0000">
<metadata tag="bugReady" timestamp="Mon, 04 May 2009 12:25:25 +0000">