vendor:
GemStone/S
by:
Jeremy Brown
7.2
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: GemStone/S
Affected Version From: GemStone/S 6.3.1
Affected Version To: GemStone/S 6.3.1
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian 5 (Lenny) and Ubuntu 9.04 (Jaunty Jackalope)
2009
GemStone/S 6.3.1 “stoned” Local Buffer Overflow Exploit
Gemstone/S "stoned" suffers from a local buffer overflow when parsing input either from the "-e" or "-l" flags, which allows a user to specify an exe config file and logfile, respectively. Both use the same buffer that is overflowed and we can overwrite the instruction pointer to control the flow of "stoned". The exploit was tested on Debian 5 (Lenny) and Ubuntu 9.04 (Jaunty Jackalope).
Mitigation:
The engineering group has informed that most or all of the issues have been fixed in the latest 64-bit rpms.