Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2004-0548
6 documents6 sources
Severity
7.2HIGH
EPSS
0.2%
top 59.84%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 6
Latest updateApr 29
Description
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
CVSS vector
AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0
Affected Packages3 packages
š“Vulnerability Details
3GHSAā¶
GHSA-qj45-8h8f-43w4: Multiple stack-based buffer overflows in the word-list-compress functionality in compressā2022-04-29
OSVā¶
CVE-2004-0548: Multiple stack-based buffer overflows in the word-list-compress functionality in compressā2004-08-06
CVEListā¶
CVE-2004-0548: Multiple stack-based buffer overflows in the word-list-compress functionality in compressā2004-06-11
š„Exploits & PoCs
1šVendor Advisories
1Debianā¶
CVE-2004-0548: aspell - Multiple stack-based buffer overflows in the word-list-compress functionality in...ā2004