Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-0065

Опубликовано: 06 окт. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

РелизСтатусПримечание
devel

not-affected

1.0.7-2
hardy

DNE

lucid

not-affected

1.0.2-1ubuntu2
maverick

not-affected

1.0.4-1
natty

released

1.0.7-1ubuntu0.11.04.1
oneiric

released

1.0.7-1ubuntu0.11.10.1
upstream

released

1.0.7-2

Показывать по

EPSS

Процентиль: 48%
0.00255
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

nvd
больше 13 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

debian
больше 13 лет назад

Heap-based buffer overflow in the receive_packet function in libusbmux ...

github
почти 4 года назад

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.

EPSS

Процентиль: 48%
0.00255
Низкий

4.6 Medium

CVSS2