Vulnerability Details : CVE-2010-2947
Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-2947
Probability of exploitation activity in the next 30 days: 13.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2947
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-2947
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2947
-
http://www.openwall.com/lists/oss-security/2010/08/20/12
oss-security - Re: CVE Request: heap-based buffer overflow in libHX
-
http://www.openwall.com/lists/oss-security/2010/08/20/5
oss-security - CVE Request: heap-based buffer overflow in libHX
-
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:019
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:165
mandriva.com
-
https://bugzilla.redhat.com/show_bug.cgi?id=625866
625866 – (CVE-2010-2947) CVE-2010-2947 libHX: buffer overrun in HX_split()
-
http://www.vupen.com/english/advisories/2010/2232
Webmail | OVH- OVH
-
http://www.securityfocus.com/bid/42592
libHX 'HX_split()' Remote Heap-Based Buffer Overflow Vulnerability
-
http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx%3Ba=commit%3Bh=904a46f90dd3f046bfac0b64a5e813d7cd4fca59
libHX / Git tools
Products affected by CVE-2010-2947
- cpe:2.3:a:jan_engelhardt:libhx:*:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.25:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.23:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.27:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.26:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.28:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.17:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.15:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:jan_engelhardt:libhx:1.18:*:*:*:*:*:*:*