Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5xjw-36fw-5xm4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via an OXM file with a negative value, which bypasses a check in (1) test_oxm and (2) decrunch_oxm functions in misc/oxm.c, leading to a buffer overflow.

Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via an OXM file with a negative value, which bypasses a check in (1) test_oxm and (2) decrunch_oxm functions in misc/oxm.c, leading to a buffer overflow.

EPSS

Процентиль: 91%
0.06839
Низкий

Дефекты

CWE-94

Связанные уязвимости

ubuntu
около 16 лет назад

Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via an OXM file with a negative value, which bypasses a check in (1) test_oxm and (2) decrunch_oxm functions in misc/oxm.c, leading to a buffer overflow.

redhat
почти 18 лет назад

Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via an OXM file with a negative value, which bypasses a check in (1) test_oxm and (2) decrunch_oxm functions in misc/oxm.c, leading to a buffer overflow.

nvd
около 16 лет назад

Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via an OXM file with a negative value, which bypasses a check in (1) test_oxm and (2) decrunch_oxm functions in misc/oxm.c, leading to a buffer overflow.

debian
около 16 лет назад

Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers ...

EPSS

Процентиль: 91%
0.06839
Низкий

Дефекты

CWE-94