Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-2891Improper Restriction of Operations within the Bounds of a Memory Buffer in Libsmi

Severity
7.5HIGHNVD
EPSS
32.6%
top 3.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 28
Latest updateJun 11

Description

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages7 packages

debiandebian/libsmi< libsmi 0.4.8+dfsg2-3 (bookworm)
Debiantu-braunschweig/libsmi< 0.4.8+dfsg2-3+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-gwqp-8wjj-p3gj: Buffer overflow in the smiGetNode function in lib/smi2022-05-14
OSV
CVE-2010-2891: Buffer overflow in the smiGetNode function in lib/smi2010-10-28

💥Exploits & PoCs

1
Exploit-DB
LibSMI smiGetNode - Buffer Overflow When Long OID Is Given In Numerical Form2010-10-20

📋Vendor Advisories

3
Microsoft
CVE-2010-2891: NIST NVD Details: https://nvd2024-06-11
Red Hat
libsmi: buffer overflow in smiGetNode can lead to arbitrary code execution2010-10-20
Debian
CVE-2010-2891: libsmi - Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows c...2010

💬Community

1
Bugzilla
CVE-2010-2891 libsmi: buffer overflow in smiGetNode can lead to arbitrary code execution2010-10-28