Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-0172

Опубликовано: 11 апр. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

РелизСтатусПримечание
devel

released

0.158-0ubuntu5.1
esm-infra-legacy/trusty

released

0.158-0ubuntu5.1
lucid

not-affected

code not present
precise

not-affected

code not present
quantal

released

0.153-1ubuntu1.1
saucy

released

0.157-1ubuntu1.1
trusty

released

0.158-0ubuntu5.1
trusty/esm

released

0.158-0ubuntu5.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 83%
0.01832
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

nvd
почти 12 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

debian
почти 12 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in ...

github
больше 3 лет назад

Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 83%
0.01832
Низкий

6.8 Medium

CVSS2