Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-3546

Опубликовано: 07 авг. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

РелизСтатусПримечание
dapper

released

1.1.3-1ubuntu1.1
devel

not-affected

1:1.6.0.4-1ubuntu1
feisty

ignored

end of life, was needed
gutsy

released

1:1.5.2.5-2ubuntu0.1
hardy

released

1:1.5.4.3-1ubuntu2.1
intrepid

released

1:1.5.6.3-1.1ubuntu2.1
upstream

released

1:1.5.6.3-1.1

Показывать по

EPSS

Процентиль: 82%
0.01761
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 17 лет назад

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

debian
больше 17 лет назад

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_cha ...

github
почти 4 года назад

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

fstec
больше 17 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 82%
0.01761
Низкий

7.5 High

CVSS2