Description
Multiple buffer overflows in STLport before 5.0.3 allow remote attackers to execute arbitrary code via unspecified vectors relating to (1) "print floats" and (2) a missing null termination in the "rope constructor."
References (10)
Core 10
Core References
Patch, Third Party Advisory, VDB Entry, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22423
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32244
Not Applicable x_refsource_confirm
http://sourceforge.net/project/shownotes.php?release_id=483468
Not Applicable, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24024
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32242
Broken Link vdb-entry
x_refsource_osvdb
http://osvdb.org/33106
Permissions Required vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0498
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200703-07.xml
Broken Link vdb-entry
x_refsource_osvdb
http://osvdb.org/33107
Not Applicable third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24428
Scores
EPSS
0.0745
EPSS Percentile
91.8%
Details
CWE
CWE-120
Status
published
Products (1)
stlport_project/stlport
< 5.0.3
Published
Feb 07, 2007
Tracked Since
Feb 18, 2026