Multiple buffer overflows in STLport 5.0.2 might allow local users to execute arbitrary code via (1) long locale environment variables to a strcpy function call in c_locale_glibc2.c and (2) long arguments to unspecified functions in num_put_float.cpp.
Threat-Mapped Scoring
Score: 1.8
Priority: P4 - Informational (Low)
S9 – Sabotage of System/App
EPSS
Score: 0.0015 Percentile:
0.36429
CVSS Scoring
CVSS v2 Score: 4.6
Severity:
Mapped CWE(s)
CWE-120
: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
All CAPEC(s)
CAPEC-10: Buffer Overflow via Environment Variables