Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vqcg-7gjc-556x

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

EPSS

Процентиль: 48%
0.00255
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

redhat
около 14 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

nvd
больше 13 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

debian
больше 13 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmux ...

EPSS

Процентиль: 48%
0.00255
Низкий

Дефекты

CWE-119