Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6f86-ff42-6g2f

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

EPSS

Процентиль: 88%
0.04226
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

nvd
почти 21 год назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0.40, when it is not using netpbm, allows remote attackers to execute arbitrary code via a P3 format PNM file with more data than implied by its width and height values.

debian
почти 21 год назад

Heap-based buffer overflow in the readpgm function in pnm.c for GOCR 0 ...

EPSS

Процентиль: 88%
0.04226
Низкий