Vulnerability Description
Stack-based buffer overflow in the msx_readnode function in libmosix.c in openmosix-tools (aka userspace-tools) in openMosix might allow local users to cause a denial of service (application crash) via a third-party program that calls this function with a long item argument. NOTE: the vendor does not provide any program that is capable of causing this overflow.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openmosix Project | Openmosix | All versions |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/3813
- http://www.securityfocus.com/archive/1/490534/100/0/threaded
- http://www.securityfocus.com/bid/28663
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41691
- http://securityreason.com/securityalert/3813
- http://www.securityfocus.com/archive/1/490534/100/0/threaded
- http://www.securityfocus.com/bid/28663
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41691
FAQ
What is CVE-2008-1865?
CVE-2008-1865 is a vulnerability with a CVSS score of 1.9 (LOW). Stack-based buffer overflow in the msx_readnode function in libmosix.c in openmosix-tools (aka userspace-tools) in openMosix might allow local users to cause a denial of service (application crash) vi...
How severe is CVE-2008-1865?
CVE-2008-1865 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1865?
Check the references section above for vendor advisories and patch information. Affected products include: Openmosix Project Openmosix.