Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6f86-ff42-6g2f

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

EPSS

Процентиль: 88%
0.04226
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

nvd
больше 20 лет назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

debian
больше 20 лет назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0 ...

EPSS

Процентиль: 88%
0.04226
Низкий