Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-0256

Опубликовано: 04 фев. 2022
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864

An out-of-bounds write flaw was found in gdisks' LoadPartitionTable() function of 'gpt.cc'. The exploitation of this flaw requires the use of a malicious storage device (for example, a USB Stick) that can cause a crash when physically inserted into the system and possible local privilege escalation. This flaw allows an attacker to compromise confidentiality, integrity, and data availability.

Отчет

This vulnerability does affect Red Hat Enterprise Linux 6, 7, and 8 because our code-base is vulnerable to this issue. Red Hat Product Security has rated this issue as a Moderate security impact and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. For additional information, refer to the Red Hat Enterprise Linux Life Cycle & Update Policy: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gdiskOut of support scope
Red Hat Enterprise Linux 7gdiskOut of support scope
Red Hat Enterprise Linux 9gdiskNot affected
Red Hat Enterprise Linux 8gdiskFixedRHSA-2022:770008.11.2022
Red Hat Enterprise Linux 8.6 Extended Update SupportgdiskFixedRHSA-2024:348630.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2051939gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc

EPSS

Процентиль: 8%
0.00033
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
около 5 лет назад

In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864

CVSS3: 6.8
nvd
около 5 лет назад

In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864

CVSS3: 6.8
debian
около 5 лет назад

In LoadPartitionTable of gpt.cc, there is a possible out of bounds wri ...

github
около 3 лет назад

In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864

CVSS3: 6.8
fstec
около 5 лет назад

Уязвимость функции LoadPartitionTable компонента gpt.cc инструмента для разметки диска GPT fdisk, нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 8%
0.00033
Низкий

6.8 Medium

CVSS3