Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fjv9-r9p4-38h5

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.5

Описание

** DISPUTED ** The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub.

** DISPUTED ** The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub.

EPSS

Процентиль: 34%
0.00138
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub

CVSS3: 5.5
nvd
больше 7 лет назад

The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub

CVSS3: 5.5
debian
больше 7 лет назад

The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map ...

EPSS

Процентиль: 34%
0.00138
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-125