Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-8364

Опубликовано: 30 апр. 2017
Источник: debian
EPSS Низкий

Описание

The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rzipfixed2.1-4.1package

Примечания

  • https://blogs.gentoo.org/ago/2017/04/29/rzip-heap-based-buffer-overflow-in-read_buf-stream-c/

  • Patch in http://download.opensuse.org/repositories/openSUSE:/Leap:/42.2:/Update/standard/src/rzip-2.1-151.3.1.src.rpm

EPSS

Процентиль: 49%
0.00261
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.

CVSS3: 7.8
nvd
почти 9 лет назад

The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.

suse-cvrf
больше 8 лет назад

Security update for rzip

CVSS3: 7.8
github
больше 3 лет назад

The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive.

EPSS

Процентиль: 49%
0.00261
Низкий