First published: Mon Jun 15 2009(Updated: )
cscope is a mature, ncurses-based, C source-code tree browsing tool.<br>Multiple buffer overflow flaws were found in cscope. An attacker could<br>create a specially crafted source code file that could cause cscope to<br>crash or, possibly, execute arbitrary code when browsed with cscope.<br>(CVE-2004-2541, CVE-2009-0148)<br>All users of cscope are advised to upgrade to this updated package, which<br>contains backported patches to fix these issues. All running instances of<br>cscope must be restarted for this update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cscope | <15.5-15.1.el5_3.1 | 15.5-15.1.el5_3.1 |
redhat/cscope | <15.5-15.1.el5_3.1 | 15.5-15.1.el5_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2009:1102 is classified as moderate.
To fix RHSA-2009:1102, you need to update cscope to version 15.5-15.1.el5_3.1 or later.
RHSA-2009:1102 addresses multiple buffer overflow vulnerabilities in cscope.
If affected by RHSA-2009:1102, an attacker could potentially crash cscope or execute arbitrary code.
RHSA-2009:1102 impacts systems running cscope versions prior to 15.5-15.1.el5_3.1 on both el5_3 and el5_3 x86_64 architectures.