Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-11723

Опубликовано: 19 июн. 2018
Источник: debian
EPSS Низкий

Описание

The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpfffixed20180714-1package
libpffno-dsastretchpackage
libpffno-dsajessiepackage

Примечания

  • http://seclists.org/fulldisclosure/2018/Jun/15

  • https://github.com/libyal/libpff/issues/64

  • https://github.com/libyal/libpff/commit/7b92bcace7e743cc9417e3cc3e4eee29abb70cf5

EPSS

Процентиль: 34%
0.00138
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub

CVSS3: 5.5
nvd
больше 7 лет назад

The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub

CVSS3: 5.5
github
больше 3 лет назад

** DISPUTED ** The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub.

EPSS

Процентиль: 34%
0.00138
Низкий