Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7m28-hv5x-hp65

Опубликовано: 03 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

EPSS

Процентиль: 8%
0.00034
Низкий

8.4 High

CVSS3

Дефекты

CWE-190

Связанные уязвимости

CVSS3: 8.4
ubuntu
9 месяцев назад

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 8.4
redhat
9 месяцев назад

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 8.4
nvd
9 месяцев назад

An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 8.4
debian
9 месяцев назад

An integer overflow vulnerability exists in the Compound Document Bina ...

CVSS3: 7.8
fstec
10 месяцев назад

Уязвимость библиотеки структурированных файлов GNOME Project G libgsf, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 8%
0.00034
Низкий

8.4 High

CVSS3

Дефекты

CWE-190