Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9949

Опубликовано: 26 июн. 2017
Источник: debian
EPSS Низкий

Описание

The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
radare2fixed1.6.0+dfsg-1package
radare2no-dsajessiepackage
radare2no-dsawheezypackage

Примечания

  • https://github.com/radare/radare2/issues/7683

  • https://github.com/radare/radare2/commit/796dd28aaa6b9fa76d99c42c4d5ff8b257cc2191

EPSS

Процентиль: 56%
0.00338
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02.

CVSS3: 7.8
nvd
больше 8 лет назад

The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02.

CVSS3: 7.8
github
больше 3 лет назад

The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (stack-based buffer underflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a buffer underflow in fs/ext2.c in GNU GRUB 2.02.

EPSS

Процентиль: 56%
0.00338
Низкий