First published: Sun Jun 17 2012(Updated: )
Multiple buffer overflows in FlightGear 2.6 and earlier and SimGear 2.6 and earlier allow user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long string in a rotor tag of an aircraft xml model to the Rotor::getValueforFGSet function in src/FDM/YASim/Rotor.cpp or (2) a crafted UDP packet to the SGSocketUDP::read function in simgear/simgear/simgear/io/sg_socket_udp.cxx.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight | <=2.6.0 | |
OpenDaylight | =1.9.1 | |
OpenDaylight | =2.0.0 | |
SimGear | <=2.6.0 | |
SimGear | =1.9.1 | |
SimGear | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2091 is considered a high severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2012-2091, upgrade to FlightGear version 2.8 or later and SimGear version 2.8 or later.
CVE-2012-2091 affects FlightGear versions up to and including 2.6.0 and SimGear versions up to and including 2.6.0.
CVE-2012-2091 is a buffer overflow vulnerability that can be triggered by malformed XML input.
Yes, CVE-2012-2091 can be exploited by remote attackers, but user assistance is required to trigger the vulnerability.