Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5345

Опубликовано: 12 янв. 2018
Источник: debian
EPSS Низкий

Описание

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gcabfixed0.7-7package

Примечания

  • https://git.gnome.org/browse/gcab/commit/?id=bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b

EPSS

Процентиль: 72%
0.00752
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

CVSS3: 5.3
redhat
почти 8 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

CVSS3: 7.8
nvd
почти 8 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

CVSS3: 7.8
github
больше 3 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

oracle-oval
больше 7 лет назад

ELSA-2018-0350: gcab security update (IMPORTANT)

EPSS

Процентиль: 72%
0.00752
Низкий
Уязвимость CVE-2018-5345