Описание
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
Ссылки
- Product
- Product
- ExploitIssue Tracking
- ExploitIssue Tracking
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.9 (включая)
cpe:2.3:a:corosync:corosync:*:*:*:*:*:*:*:*
EPSS
Процентиль: 22%
0.00072
Низкий
9 Critical
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-121
CWE-787
Связанные уязвимости
CVSS3: 9
ubuntu
8 месяцев назад
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVSS3: 6.6
redhat
8 месяцев назад
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVSS3: 9
debian
8 месяцев назад
Corosync through 3.1.9, if encryption is disabled or the attacker know ...
EPSS
Процентиль: 22%
0.00072
Низкий
9 Critical
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-121
CWE-787