Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3548

Опубликовано: 26 мая 2021
Источник: debian
EPSS Низкий

Описание

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dmg2imgunfixedpackage

Примечания

  • https://github.com/Lekensteyn/dmg2img/issues/9

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 41%
0.0019
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

CVSS3: 7.1
nvd
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

github
больше 3 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость функции main() инструмента для конвертирования сжатых файлов dmgdmg2img, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании

EPSS

Процентиль: 41%
0.0019
Низкий