Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-29394

Опубликовано: 30 нояб. 2020
Источник: debian

Описание

A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dlt-daemonfixed2.18.5-0.3package

Примечания

  • https://github.com/GENIVI/dlt-daemon/issues/274

  • https://github.com/GENIVI/dlt-daemon/pull/275

  • https://github.com/GENIVI/dlt-daemon/commit/ff4f44c159df6f44b48bd38c9d2f104eb360be11

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 5 лет назад

A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).

CVSS3: 7.8
nvd
около 5 лет назад

A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).

CVSS3: 7.8
github
больше 3 лет назад

A buffer overflow in the dlt_filter_load function in dlt_common.c in dlt-daemon 2.8.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in a format argument).