Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8xh3-3wj9-mjw4

Опубликовано: 15 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14845)

A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14845)

EPSS

Процентиль: 74%
0.00853
Низкий

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 7.8
nvd
около 4 лет назад

A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14845)

CVSS3: 7.8
fstec
около 4 лет назад

Уязвимость наборов инструментов для разработки приложений JT Utilities и JT Open Toolkit (JTTK), связанная с переполнением буфера на стеке, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 74%
0.00853
Низкий

Дефекты

CWE-121