Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-6758

Опубликовано: 06 фев. 2018
Источник: debian
EPSS Низкий

Описание

The uwsgi_expand_path function in core/utils.c in Unbit uWSGI through 2.0.15 has a stack-based buffer overflow via a large directory length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
uwsgifixed2.0.15-10.2package
uwsgifixed2.0.14+20161117-3+deb9u1stretchpackage
uwsgifixed2.0.7-1+deb8u2jessiepackage

Примечания

  • http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html

  • https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe

EPSS

Процентиль: 67%
0.00548
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

The uwsgi_expand_path function in core/utils.c in Unbit uWSGI through 2.0.15 has a stack-based buffer overflow via a large directory length.

CVSS3: 9.8
nvd
около 8 лет назад

The uwsgi_expand_path function in core/utils.c in Unbit uWSGI through 2.0.15 has a stack-based buffer overflow via a large directory length.

CVSS3: 9.8
github
больше 3 лет назад

The uwsgi_expand_path function in core/utils.c in Unbit uWSGI through 2.0.15 has a stack-based buffer overflow via a large directory length.

EPSS

Процентиль: 67%
0.00548
Низкий