Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jr8q-jw7m-4m3m

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 3.3

Описание

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

EPSS

Процентиль: 28%
0.001
Низкий

3.3 Low

CVSS3

Дефекты

CWE-125
CWE-200

Связанные уязвимости

CVSS3: 3.3
ubuntu
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 4.3
redhat
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
nvd
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

CVSS3: 3.3
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 3.3
debian
больше 6 лет назад

An out of bounds read was discovered in systemd-journald in the way it ...

EPSS

Процентиль: 28%
0.001
Низкий

3.3 Low

CVSS3

Дефекты

CWE-125
CWE-200