Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mvxf-4rwc-h287

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

EPSS

Процентиль: 85%
0.02548
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

redhat
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

nvd
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

debian
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function ...

EPSS

Процентиль: 85%
0.02548
Низкий

Дефекты

CWE-119