A vulnerability has been discovered in PLIB, which can be
exploited by malicious people to compromise an application using
the library.
The vulnerability is caused due to a boundary error within the
"ulSetError()" function (src/util/ulError.cxx) when creating the
error message, which can be exploited to overflow a static
buffer.
Successful exploitation allows the execution of arbitrary code
but requires that the attacker can e.g. control the content of
an overly long error message passed to the "ulSetError()"
function.
The vulnerability is confirmed in version 1.8.5. Other versions
may also be affected.