Описание
There is a heap-based buffer overflow in the LoadPCX function of in_pcx.cpp in sam2p 0.49.4. A Crafted input will lead to a denial of service or possibly unspecified other impact.
Ссылки
- ExploitThird Party Advisory
- Mailing ListThird Party Advisory
- ExploitThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:sam2p_project:sam2p:0.49.4:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
EPSS
Процентиль: 42%
0.00198
Низкий
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 7.8
ubuntu
почти 8 лет назад
There is a heap-based buffer overflow in the LoadPCX function of in_pcx.cpp in sam2p 0.49.4. A Crafted input will lead to a denial of service or possibly unspecified other impact.
CVSS3: 7.8
debian
почти 8 лет назад
There is a heap-based buffer overflow in the LoadPCX function of in_pc ...
CVSS3: 7.8
github
больше 3 лет назад
There is a heap-based buffer overflow in the LoadPCX function of in_pcx.cpp in sam2p 0.49.4. A Crafted input will lead to a denial of service or possibly unspecified other impact.
EPSS
Процентиль: 42%
0.00198
Низкий
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-787