Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-17942

Опубликовано: 03 окт. 2018
Источник: debian
EPSS Низкий

Описание

The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnulibfixed20140202+stable-3.1package
gnulibfixed20140202+stable-2+deb9u1stretchpackage

Примечания

  • pspp affecting bug: https://savannah.gnu.org/bugs/?func=detailitem&item_id=54686

  • https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html

  • https://github.com/coreutils/gnulib/commit/278b4175c9d7dd47c1a3071554aac02add3b3c35

EPSS

Процентиль: 83%
0.02079
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 7 лет назад

The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.

CVSS3: 3.3
redhat
почти 7 лет назад

The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.

CVSS3: 8.8
nvd
почти 7 лет назад

The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.

CVSS3: 8.8
github
больше 3 лет назад

The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.

EPSS

Процентиль: 83%
0.02079
Низкий