Описание
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a certain memory location as the holder of a loop iteration count, which allows user-assisted remote attackers to cause a denial of service (long loop) and prevent examination of certain NTFS files via a malformed NTFS image.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 2.09-1 |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | ignored | end of life, was needed |
hardy | released | 2.09-1 |
intrepid | released | 2.09-1 |
jaunty | released | 2.09-1 |
karmic | released | 2.09-1 |
upstream | released | 2.09 |
Показывать по
Ссылки на источники
4.3 Medium
CVSS2
Связанные уязвимости
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a certain memory location as the holder of a loop iteration count, which allows user-assisted remote attackers to cause a denial of service (long loop) and prevent examination of certain NTFS files via a malformed NTFS image.
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a ...
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a certain memory location as the holder of a loop iteration count, which allows user-assisted remote attackers to cause a denial of service (long loop) and prevent examination of certain NTFS files via a malformed NTFS image.
4.3 Medium
CVSS2