Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wvrh-73qw-9vj9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

EPSS

Процентиль: 79%
0.01343
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 11 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

redhat
почти 11 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

nvd
почти 11 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

debian
почти 11 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio ...

oracle-oval
почти 10 лет назад

ELSA-2015-2108: cpio security and bug fix update (MODERATE)

EPSS

Процентиль: 79%
0.01343
Низкий

Дефекты

CWE-119