Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-2922

Опубликовано: 07 нояб. 2017
Источник: debian
EPSS Низкий

Описание

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
smplayerfixed18.5.0~ds1-1package
smplayernot-affectedstretchpackage
smplayernot-affectedjessiepackage
smplayernot-affectedwheezypackage

Примечания

  • 18.5.0~ds1-1 isn't fixed on the source level, but no longer builds the Chromecast support

EPSS

Процентиль: 86%
0.02712
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

CVSS3: 9.8
nvd
около 8 лет назад

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

CVSS3: 9.8
github
больше 3 лет назад

An exploitable memory corruption vulnerability exists in the Websocket protocol implementation of Cesanta Mongoose 6.8. A specially crafted websocket packet can cause a buffer to be allocated while leaving stale pointers which leads to a use-after-free vulnerability which can be exploited to achieve remote code execution. An attacker needs to send a specially crafted websocket packet over the network to trigger this vulnerability.

EPSS

Процентиль: 86%
0.02712
Низкий