VYPR
Unrated severityNVD Advisory· Published Jan 4, 2013· Updated Apr 29, 2026

CVE-2012-6090

CVE-2012-6090

Description

Multiple stack-based buffer overflows in the expand function in os/pl-glob.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

Affected products

39
  • cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*+ 38 more
    • cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*range: <=6.2.4
    • cpe:2.3:a:swi-prolog:swi-prolog:5.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.10.2:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.10.3:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.10.4:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.10.5:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.50:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.51:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.52:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.53:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.54:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.55:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.56:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.57:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.58:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.59:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.61:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.62:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.63:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.6.64:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.8.1:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:5.8.3:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:swi-prolog:swi-prolog:6.3.6:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.