Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2226

Опубликовано: 24 фев. 2017
Источник: debian

Описание

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
htfixed2.1.0+repack1-1package
htno-dsajessiepackage
htno-dsawheezypackage
binutilsfixed2.27.51.20161102-1package
binutilsignoredjessiepackage
libibertyfixed20161011-1package
libibertyno-dsajessiepackage
libibertyno-dsawheezypackage

Примечания

  • https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687

  • https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=234829

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.

CVSS3: 3.3
redhat
около 10 лет назад

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.

CVSS3: 7.8
nvd
почти 9 лет назад

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.

CVSS3: 7.8
github
больше 3 лет назад

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.