Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8fx4-47hw-m452

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

EPSS

Процентиль: 91%
0.0746
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

nvd
больше 17 лет назад

Off-by-one error in the read_client function in webhttpd.c in Motion 3.2.10 and earlier might allow remote attackers to execute arbitrary code via a long request to a Motion HTTP Control interface, which triggers a stack-based buffer overflow with some combinations of processor architecture and compiler.

debian
больше 17 лет назад

Off-by-one error in the read_client function in webhttpd.c in Motion 3 ...

EPSS

Процентиль: 91%
0.0746
Низкий