Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x35m-q6gq-75g7

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

EPSS

Процентиль: 41%
0.0019
Низкий

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

CVSS3: 7.1
nvd
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

CVSS3: 7.1
debian
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate ...

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость функции main() инструмента для конвертирования сжатых файлов dmgdmg2img, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании

EPSS

Процентиль: 41%
0.0019
Низкий

Дефекты

CWE-125