Описание
Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.0.7-2 |
| hardy | DNE | |
| lucid | not-affected | 1.0.2-1ubuntu2 |
| maverick | not-affected | 1.0.4-1 |
| natty | released | 1.0.7-1ubuntu0.11.04.1 |
| oneiric | released | 1.0.7-1ubuntu0.11.10.1 |
| upstream | released | 1.0.7-2 |
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
Heap-based buffer overflow in the receive_packet function in libusbmux ...
Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
EPSS
4.6 Medium
CVSS2