Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5345

Опубликовано: 19 дек. 2017
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8gcabNot affected
Red Hat Enterprise Linux 7gcabFixedRHSA-2018:035026.02.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1527296gcab: Extracting malformed .cab files causes stack smashing potentially leading to arbitrary code execution

EPSS

Процентиль: 72%
0.00752
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

CVSS3: 7.8
nvd
почти 8 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

CVSS3: 7.8
debian
почти 8 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be e ...

CVSS3: 7.8
github
больше 3 лет назад

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

oracle-oval
больше 7 лет назад

ELSA-2018-0350: gcab security update (IMPORTANT)

EPSS

Процентиль: 72%
0.00752
Низкий

5.3 Medium

CVSS3