CVE-2006-0459

N/A Unknown
Published: March 29, 2006 Modified: April 16, 2026
View on NVD

Description

flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19071
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/19126
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/19228
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/19424
Source: secalert@redhat.com
Patch Vendor Advisory
http://securityreason.com/securityalert/570
Source: secalert@redhat.com
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml
Source: secalert@redhat.com
Third Party Advisory
http://www.osvdb.org/23440
Source: secalert@redhat.com
Broken Link Patch
http://www.securityfocus.com/bid/16896
Source: secalert@redhat.com
Patch Third Party Advisory VDB Entry
http://www.us.debian.org/security/2006/dsa-1020
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2006/0770
Source: secalert@redhat.com
Broken Link URL Repurposed
https://usn.ubuntu.com/260-1/
Source: secalert@redhat.com
Third Party Advisory
http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download
Source: af854a3a-2127-422b-91ae-364da2661108
Product
http://secunia.com/advisories/19071
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19126
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/19228
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/19424
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securityreason.com/securityalert/570
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.osvdb.org/23440
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch
http://www.securityfocus.com/bid/16896
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.us.debian.org/security/2006/dsa-1020
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2006/0770
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link URL Repurposed
https://exchange.xforce.ibmcloud.com/vulnerabilities/24995
Source: af854a3a-2127-422b-91ae-364da2661108
VDB Entry
https://usn.ubuntu.com/260-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

28 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.0%
88th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

westes