Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14931

Опубликовано: 19 июн. 2020
Источник: debian
EPSS Низкий

Описание

A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dmitryfixed1.3a-5package
dmitryfixed1.3a-1.2+deb12u1bookwormpackage
dmitrypostponedbusterpackage

Примечания

  • https://github.com/jaygreig86/dmitry/issues/4

  • https://github.com/jaygreig86/dmitry/pull/6

  • Fixed by: https://github.com/jaygreig86/dmitry/commit/da1fda491145719ae15dd36dd37a69bdbba0b192

EPSS

Процентиль: 71%
0.00689
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.

CVSS3: 9.8
nvd
больше 5 лет назад

A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.

CVSS3: 9.8
github
больше 3 лет назад

A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.

EPSS

Процентиль: 71%
0.00689
Низкий