Описание
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
Ссылки
- ExploitPatchVendor Advisory
- US Government Resource
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- US Government Resource
Уязвимые конфигурации
Одно из
Одно из
EPSS
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
Buffer overflow in tryelf() in readelf.c of the file command allows at ...
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
Уязвимость операционной системы Red Hat Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
4.6 Medium
CVSS2