Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9465

Опубликовано: 06 июн. 2017
Источник: debian
EPSS Низкий

Описание

The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function in libyara/scan.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
yarafixed3.6.2+dfsg-1package
yaraignoredstretchpackage
yaraignoredjessiepackage

Примечания

  • https://github.com/VirusTotal/yara/issues/678

  • https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661

EPSS

Процентиль: 33%
0.00132
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 8 лет назад

The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function in libyara/scan.c.

CVSS3: 7.1
nvd
больше 8 лет назад

The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function in libyara/scan.c.

CVSS3: 7.1
github
больше 3 лет назад

The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function in libyara/scan.c.

EPSS

Процентиль: 33%
0.00132
Низкий