An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 | Exploit Technical Description Third Party Advisory |
| http://www.securityfocus.com/bid/100828 | Third Party Advisory VDB Entry |
| https://lists.debian.org/debian-lts-announce/2017/11/msg00038.html | |
| https://security.gentoo.org/glsa/201908-26 |
Configurations
Information
Published : 2017-09-13 18:29
Updated : 2018-02-04 02:29
NVD link : CVE-2017-2816
Mitre link : CVE-2017-2816
JSON object : View
Products Affected
libofx_project
- libofx
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
