CVE-2008-3908

Multiple buffer overflows in Princeton WordNet (wn) 3.0 allow context-dependent attackers to execute arbitrary code via (1) a long argument on the command line; a long (2) WNSEARCHDIR, (3) WNHOME, or (4) WNDBVERSION environment variable; or (5) a user-supplied dictionary (aka data file).  NOTE: since WordNet itself does not run with special privileges, this issue only crosses privilege boundaries when WordNet is invoked as a third party component.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
princeton_universitywordnet
3.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wordnet
bullseye
1:3.0-36
fixed
bookworm
1:3.0-37
fixed
sid
1:3.0-38
fixed
trixie
1:3.0-38
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wordnet
karmic
Fixed 1:3.0-11ubuntu0.1
released
jaunty
Fixed 1:3.0-11ubuntu0.1
released
intrepid
Fixed 1:3.0-11ubuntu0.1
released
hardy
Fixed 1:3.0-6ubuntu0.1
released
gutsy
ignored
feisty
Fixed 1:2.1-4ubuntu0.1
released
dapper
ignored