Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7938

Опубликовано: 20 апр. 2017
Источник: debian

Описание

Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dmitryfixed1.3a-5package
dmitryfixed1.3a-1.2+deb12u1bookwormpackage
dmitrypostponedbusterpackage

Примечания

  • https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html

  • https://github.com/jaygreig86/dmitry/pull/12

Связанные уязвимости

CVSS3: 6.6
ubuntu
почти 9 лет назад

Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.

CVSS3: 6.6
nvd
почти 9 лет назад

Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.

CVSS3: 9.8
github
больше 3 лет назад

Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.