Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-40647

Опубликовано: 09 сент. 2022
Источник: debian

Описание

In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
man2htmlfixed1.6g-16package
man2htmlno-dsabookwormpackage
man2htmlno-dsabullseyepackage
man2htmlno-dsabusterpackage

Примечания

  • https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 3 лет назад

In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory.

CVSS3: 5.5
nvd
больше 3 лет назад

In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory.

CVSS3: 5.5
github
больше 3 лет назад

In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory.

CVSS3: 5.5
fstec
больше 4 лет назад

Уязвимость инструмента командной строки man2html, связанная с выходом операции за границы буфера в памяти при обработке параметра size, позволяющая нарушителю выполнять произвольный код или вызвать отказ в обслуживании

CVSS3: 5.5
redos
5 месяцев назад

Множественные уязвимости man2html