DescriptionMultiple buffer overflows in FlightGear 2.6 and earlier and SimGear 2.6 and earlier allow user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long string in a rotor tag of an aircraft xml model to the Rotor::getValueforFGSet function in src/FDM/YASim/Rotor.cpp or (2) a crafted UDP packet to the SGSocketUDP::read function in simgear/simgear/simgear/io/sg_socket_udp.cxx.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs669024, 669025

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
flightgear (PTS)stretch1:2016.4.4+dfsg-3+deb9u1fixed
bookworm, sid, bullseye1:2020.3.6+dfsg-1fixed
simgear (PTS)stretch1:2016.4.4+dfsg-2fixed
bookworm, sid, bullseye1:2020.3.6+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


Negligible security impact, very obscure attack vector

Search for package or bug name: Reporting problems