Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-41881

Опубликовано: 29 июл. 2024
Источник: debian
EPSS Низкий

Описание

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sdopunfixedpackage

Примечания

  • Crash in CLI tool, no security impact

  • https://github.com/PhilipHazel/SDoP/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023

EPSS

Процентиль: 63%
0.00459
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.

CVSS3: 8.8
nvd
больше 1 года назад

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.

CVSS3: 8.8
github
больше 1 года назад

SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.

EPSS

Процентиль: 63%
0.00459
Низкий