Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2891

Опубликовано: 28 окт. 2010
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 7.5

Описание

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
hardy

ignored

end of life
karmic

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life
natty

not-affected

0.4.8+dfsg2-3
oneiric

not-affected

precise

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 95%
0.17405
Средний

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 14 лет назад

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.

nvd
больше 14 лет назад

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.

msrc
больше 3 лет назад

Описание отсутствует

debian
больше 14 лет назад

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4. ...

github
около 3 лет назад

Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.

EPSS

Процентиль: 95%
0.17405
Средний

7.5 High

CVSS2