{ "schema_version": "1.4.0", "id": "GHSA-vpg2-8g7f-3vh6", "modified": "2022-05-14T02:53:59Z", "published": "2022-05-14T02:53:59Z", "aliases": [ "CVE-2014-0749" ], "details": "Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0749" }, { "type": "WEB", "url": "https://github.com/adaptivecomputing/torque/pull/171" }, { "type": "WEB", "url": "https://github.com/adaptivecomputing/torque/commit/3ed749263abe3d69fa3626d142a5789dcb5a5684" }, { "type": "WEB", "url": "https://labs.mwrinfosecurity.com/advisories/2014/05/14/torque-buffer-overflow" }, { "type": "WEB", "url": "https://labs.mwrinfosecurity.com/system/assets/662/original/torque-buffer-overflow_2014-05-14.pdf" }, { "type": "WEB", "url": "http://osvdb.org/show/osvdb/107024" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/126651/Torque-2.5.13-Buffer-Overflow.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/126855/TORQUE-Resource-Manager-2.5.13-Buffer-Overflow.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2936" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/33554" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/532110/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/67420" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-05-16T14:55:00Z" } }