Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-3631

Опубликовано: 15 окт. 2011
Источник: redhat
CVSS2: 4.1
EPSS Низкий

Описание

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5hardlinkWill not fix
Red Hat Enterprise Linux 6hardlinkWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=746710hardlink: Multiple integer overflows, when adding string lengths

EPSS

Процентиль: 88%
0.04155
Низкий

4.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
nvd
около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
debian
около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-b ...

github
почти 4 года назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

EPSS

Процентиль: 88%
0.04155
Низкий

4.1 Medium

CVSS2