Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j9cr-wr26-g3fp

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

EPSS

Процентиль: 82%
0.01761
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 17 лет назад

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

nvd
больше 17 лет назад

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

debian
больше 17 лет назад

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_cha ...

fstec
больше 17 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 82%
0.01761
Низкий

Дефекты

CWE-119