Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-4024

Опубликовано: 19 июл. 2012
Источник: nvd
CVSS2: 6.8
EPSS Низкий

Описание

Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:squashfs_project:squashfs:*:*:*:*:*:*:*:*
Версия до 4.2 (включая)

EPSS

Процентиль: 84%
0.02288
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-787

Связанные уязвимости

ubuntu
больше 13 лет назад

Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.

redhat
больше 13 лет назад

Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.

debian
больше 13 лет назад

Stack-based buffer overflow in the get_component function in unsquashf ...

github
больше 3 лет назад

Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.

EPSS

Процентиль: 84%
0.02288
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-787