Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-5325

Опубликовано: 05 мая 2015
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.

It was discovered that the unhtmlify() function of foomatic-rip did not correctly calculate buffer sizes, possibly leading to a heap-based memory corruption. A malicious attacker could exploit this flaw to cause foomatic-rip to crash or, possibly, execute arbitrary code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5foomaticNot affected
Red Hat Enterprise Linux 7foomaticNot affected
Red Hat Enterprise Linux 6foomaticFixedRHSA-2016:049122.03.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-131->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1218297foomatic: potential remote arbitrary code execution

EPSS

Процентиль: 90%
0.05963
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.

CVSS3: 9.8
nvd
больше 9 лет назад

Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.

CVSS3: 9.8
debian
больше 9 лет назад

Heap-based buffer overflow in the unhtmlify function in foomatic-rip i ...

CVSS3: 9.8
github
больше 3 лет назад

Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.

oracle-oval
больше 9 лет назад

ELSA-2016-0491: foomatic security update (MODERATE)

EPSS

Процентиль: 90%
0.05963
Низкий

6.8 Medium

CVSS2