Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5g5m-5cc6-hj59

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.

Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.

EPSS

Процентиль: 83%
0.01993
Низкий

Связанные уязвимости

nvd
больше 19 лет назад

Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.

EPSS

Процентиль: 83%
0.01993
Низкий