Описание
in.uucpd UUCP server in Debian GNU/Linux 2.2, and possibly other operating systems, does not properly terminate long strings, which allows remote attackers to cause a denial of service, possibly due to a buffer overflow.
Ссылки
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*
EPSS
Процентиль: 76%
0.00951
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
почти 23 года назад
in.uucpd UUCP server in Debian GNU/Linux 2.2, and possibly other opera ...
github
больше 3 лет назад
in.uucpd UUCP server in Debian GNU/Linux 2.2, and possibly other operating systems, does not properly terminate long strings, which allows remote attackers to cause a denial of service, possibly due to a buffer overflow.
EPSS
Процентиль: 76%
0.00951
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other