Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xm6q-6v7q-65qv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.

EPSS

Процентиль: 95%
0.1696
Средний

Связанные уязвимости

nvd
почти 20 лет назад

Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.

EPSS

Процентиль: 95%
0.1696
Средний