Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j7g9-fcw9-wxcf

Опубликовано: 11 авг. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.1

Описание

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

EPSS

Процентиль: 41%
0.00188
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 7.4
redhat
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 9.1
nvd
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS3: 9.1
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 9.1
debian
около 3 лет назад

An attacker who submits a crafted tar file with size in header struct ...

EPSS

Процентиль: 41%
0.00188
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-125