Описание
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | released  | 4.16-0ubuntu3.2 | 
| devel | not-affected  | |
| edgy | released  | 4.17-2ubuntu1.2 | 
| feisty | released  | 4.19-1ubuntu2.1 | 
| upstream | released  | 4.21 | 
Показывать по
EPSS
9.3 Critical
CVSS2
Связанные уязвимости
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
Integer underflow in the file_printf function in the "file" program be ...
Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
9.3 Critical
CVSS2