Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-3631

Опубликовано: 26 нояб. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.8

Описание

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

РелизСтатусПримечание
devel

not-affected

Python version not affected
hardy

DNE

lucid

not-affected

Python version not affected
maverick

not-affected

Python version not affected
natty

not-affected

Python version not affected
oneiric

not-affected

Python version not affected
upstream

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 88%
0.04155
Низкий

6.8 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

redhat
больше 14 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
nvd
около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
debian
около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-b ...

github
почти 4 года назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

EPSS

Процентиль: 88%
0.04155
Низкий

6.8 Medium

CVSS2

8.8 High

CVSS3