FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

plib -- remote code execution via buffer overflow

Affected packages
torcs < 1.3.3
plib <= 1.8.5_3

Details

VuXML ID ba51c2f7-5b43-11e1-8288-00262d5ed8ee
Discovery 2011-12-21
Entry 2012-02-19

Secunia reports:

A vulnerability has been discovered in PLIB, which can be exploited by malicious people to compromise an application using the library.

The vulnerability is caused due to a boundary error within the "ulSetError()" function (src/util/ulError.cxx) when creating the error message, which can be exploited to overflow a static buffer.

Successful exploitation allows the execution of arbitrary code but requires that the attacker can e.g. control the content of an overly long error message passed to the "ulSetError()" function.

The vulnerability is confirmed in version 1.8.5. Other versions may also be affected.

References

CVE Name CVE-2011-4620
URL http://secunia.com/advisories/47297/
URL http://torcs.sourceforge.net/index.php?name=News&file=article&sid=79