Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f326-p7mm-52h2

Опубликовано: 11 авг. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

EPSS

Процентиль: 41%
0.00188
Низкий

8.1 High

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 6.8
redhat
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 8.1
nvd
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.

CVSS3: 8.1
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 8.1
debian
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct ...

EPSS

Процентиль: 41%
0.00188
Низкий

8.1 High

CVSS3

Дефекты

CWE-125