Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10722

Опубликовано: 02 мая 2018
Источник: debian
EPSS Низкий

Описание

partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
partclonefixed0.2.88-1package
partcloneno-dsajessiepackage
partcloneno-dsawheezypackage

Примечания

  • https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/

  • https://github.com/Thomas-Tsai/partclone/issues/71

EPSS

Процентиль: 67%
0.0055
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.

CVSS3: 9.8
nvd
почти 8 лет назад

partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.

CVSS3: 9.8
github
больше 3 лет назад

partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.

EPSS

Процентиль: 67%
0.0055
Низкий