Vulnerability Description
Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tu-Braunschweig | Libsmi | 0.4.8 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://secunia.com/advisories/41841Vendor Advisory
- http://secunia.com/advisories/42877
- http://secunia.com/advisories/42902
- http://secunia.com/advisories/43068
- http://security-tracker.debian.org/tracker/CVE-2010-2891
- http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflowExploitPatch
- http://www.debian.org/security/2011/dsa-2145
- http://www.exploit-db.com/exploits/15293ExploitPatch
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:209
- http://www.securityfocus.com/archive/1/514382/100/0/threaded
- http://www.securityfocus.com/bid/44276ExploitPatch
- http://www.vupen.com/english/advisories/2010/2764Vendor Advisory
- http://www.vupen.com/english/advisories/2011/0076
FAQ
What is CVE-2010-2891?
CVE-2010-2891 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical strin...
How severe is CVE-2010-2891?
CVE-2010-2891 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-2891?
Check the references section above for vendor advisories and patch information. Affected products include: Tu-Braunschweig Libsmi.