Description
Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Core Security · textdoslinux
https://www.exploit-db.com/exploits/15293
References (18)
Core 18
Core References
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43068
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2010:209
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0212
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/41841
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/42902
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/44276
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2011/dsa-2145
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0111
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/42877
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/514382/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0076
Exploit, Patch x_refsource_misc
http://www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow
Third Party Advisory x_refsource_confirm
http://security-tracker.debian.org/tracker/CVE-2010-2891
Exploit, Patch exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/15293
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/2764
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/62686
Scores
EPSS
0.3265
EPSS Percentile
96.9%
Details
CWE
CWE-119
Status
published
Products (1)
tu-braunschweig/libsmi
0.4.8
Published
Oct 28, 2010
Tracked Since
Feb 18, 2026