Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-2885

Опубликовано: 24 апр. 2018
Источник: debian
EPSS Средний

Описание

An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libsoup2.4fixed2.56.1-1package
libsoup2.4not-affectedwheezypackage

Примечания

  • https://bugzilla.gnome.org/show_bug.cgi?id=785774

EPSS

Процентиль: 94%
0.13197
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.

CVSS3: 7.3
redhat
больше 8 лет назад

An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.

CVSS3: 9.8
nvd
больше 7 лет назад

An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.

suse-cvrf
больше 8 лет назад

Security update for libsoup

suse-cvrf
больше 8 лет назад

Security update for libsoup

EPSS

Процентиль: 94%
0.13197
Средний