Описание
Integer signedness error in attach.c in dtach 0.8 allows remote attackers to obtain sensitive information from daemon stack memory in opportunistic circumstances by reading application data after an improper connection-close request, as demonstrated by running an IRC client in dtach.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.8-2.1 |
| hardy | ignored | end of life |
| lucid | released | 0.8-2ubuntu0.10.04.1 |
| natty | ignored | end of life |
| oneiric | released | 0.8-2ubuntu0.11.10.1 |
| precise | released | 0.8-2ubuntu0.12.04.1 |
| quantal | not-affected | 0.8-2.1 |
| upstream | released | 0.8-2.1 |
Показывать по
Ссылки на источники
2.6 Low
CVSS2
Связанные уязвимости
Integer signedness error in attach.c in dtach 0.8 allows remote attackers to obtain sensitive information from daemon stack memory in opportunistic circumstances by reading application data after an improper connection-close request, as demonstrated by running an IRC client in dtach.
Integer signedness error in attach.c in dtach 0.8 allows remote attackers to obtain sensitive information from daemon stack memory in opportunistic circumstances by reading application data after an improper connection-close request, as demonstrated by running an IRC client in dtach.
Integer signedness error in attach.c in dtach 0.8 allows remote attack ...
Integer signedness error in attach.c in dtach 0.8 allows remote attackers to obtain sensitive information from daemon stack memory in opportunistic circumstances by reading application data after an improper connection-close request, as demonstrated by running an IRC client in dtach.
2.6 Low
CVSS2