Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6089

Опубликовано: 04 янв. 2013
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

6.6.4-2ubuntu1
cosmic

not-affected

6.6.4-2ubuntu1
devel

not-affected

6.6.4-2ubuntu1
esm-apps/bionic

not-affected

6.6.4-2ubuntu1
esm-apps/xenial

not-affected

6.6.4-2ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [6.6.4-2ubuntu1]]
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life

Показывать по

EPSS

Процентиль: 85%
0.02548
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

nvd
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

debian
около 13 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.

EPSS

Процентиль: 85%
0.02548
Низкий

7.5 High

CVSS2