Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7mw5-528h-7m9c

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the search_for_command function of ltrace 0.3.10, if it is installed setuid, could allow local users to execute arbitrary code via a long filename. NOTE: It is unclear whether there are any packages that install ltrace as a setuid program, so this candidate might be REJECTed.

Heap-based buffer overflow in the search_for_command function of ltrace 0.3.10, if it is installed setuid, could allow local users to execute arbitrary code via a long filename. NOTE: It is unclear whether there are any packages that install ltrace as a setuid program, so this candidate might be REJECTed.

EPSS

Процентиль: 17%
0.00054
Низкий

Связанные уязвимости

nvd
больше 21 года назад

Heap-based buffer overflow in the search_for_command function of ltrace 0.3.10, if it is installed setuid, could allow local users to execute arbitrary code via a long filename. NOTE: It is unclear whether there are any packages that install ltrace as a setuid program, so this candidate might be REJECTed.

debian
больше 21 года назад

Heap-based buffer overflow in the search_for_command function of ltrac ...

EPSS

Процентиль: 17%
0.00054
Низкий