14 lines
No EOL
577 B
Text
14 lines
No EOL
577 B
Text
source: https://www.securityfocus.com/bid/36885/info
|
|
|
|
Multiple BSD distributions are prone to a memory-corruption vulnerability because the software fails to properly bounds-check data used as an array index.
|
|
|
|
An attacker can exploit this issue to cause applications to crash with a segmentation fault, denying service to legitimate users. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed.
|
|
|
|
The following are vulnerable:
|
|
|
|
OpenBSD 4.6
|
|
NetBSD 5.0.1
|
|
|
|
The following example is available:
|
|
|
|
printf %.1100000000f 1.1 |