Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f326-p7mm-52h2

Опубликовано: 11 авг. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

EPSS

Процентиль: 38%
0.00159
Низкий

8.1 High

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 6.8
redhat
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 8.1
nvd
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 8.1
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 8.1
debian
почти 3 года назад

An attacker who submits a crafted tar file with size in header struct ...

EPSS

Процентиль: 38%
0.00159
Низкий

8.1 High

CVSS3

Дефекты

CWE-125