First published: Wed Jan 28 2009(Updated: )
Multiple buffer overflows in the CheckUniqueName function in W3C Amaya Web Browser 10.0.1, and possibly other versions including 11.0.1, might allow remote attackers to execute arbitrary code via "duplicated" attribute value inputs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
W3C Amaya | =11.0.1 | |
W3C Amaya | =10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6005 is considered to have a high severity due to its potential to allow remote code execution.
To fix CVE-2008-6005, upgrade to a non-vulnerable version of the W3C Amaya Web Browser, specifically beyond 11.0.1.
CVE-2008-6005 affects W3C Amaya Web Browser versions 10.0.1 and 11.0.1.
CVE-2008-6005 can be exploited through crafted 'duplicated' attribute value inputs leading to buffer overflow vulnerabilities.
CVE-2008-6005 is classified as a remote vulnerability as it allows attackers to execute code from a distance.