Vulnerabilities > CVE-2005-1679 - Unspecified vulnerability in Timo Rossi Picasm
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the error directive in picasm 1.12b and earlier allows attackers to execute arbitrary code via a long error message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Picasm 1.10/1.12 Error Generation Remote Buffer Overflow Vulnerability. CVE-2005-1679 . Remote exploit for freebsd platform |
id | EDB-ID:25687 |
last seen | 2016-02-03 |
modified | 2005-05-20 |
published | 2005-05-20 |
reporter | Shaun Colley |
source | https://www.exploit-db.com/download/25687/ |
title | Picasm 1.10/1.12 Error Generation Remote Buffer Overflow Vulnerability |
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_8A3ECE40331511DAA2630001020EED82.NASL |
description | Shaun Colley reports : When generating error and warning messages, picasm copies strings into fixed length buffers without bounds checking. If an attacker could trick a user into assembling a source file with a malformed |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21467 |
published | 2006-05-13 |
reporter | This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21467 |
title | FreeBSD : picasm -- buffer overflow vulnerability (8a3ece40-3315-11da-a263-0001020eed82) |