First published: Wed May 04 2005(Updated: )
Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux Desktop | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1194 has a high severity rating due to its potential to allow attackers to execute arbitrary code.
To fix CVE-2005-1194, update nasm to version 0.98 or later, as earlier versions are vulnerable.
CVE-2005-1194 primarily affects various versions of Red Hat Enterprise Linux, including 2.1, 3.0, and 4.0.
In the context of CVE-2005-1194, a stack-based buffer overflow occurs when the ieee_putascii function allows excess data to overwrite adjacent memory.
Yes, CVE-2005-1194 can be exploited remotely if an attacker provides a specially crafted asm file to the vulnerable system.