Описание
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 0.3.7.beta-20 |
| bionic | not-affected | 0.3.7.beta-20 |
| cosmic | not-affected | 0.3.7.beta-20 |
| devel | not-affected | 0.3.7.beta-20 |
| disco | not-affected | 0.3.7.beta-20 |
| eoan | not-affected | 0.3.7.beta-20 |
| esm-apps/bionic | not-affected | 0.3.7.beta-20 |
| esm-apps/focal | not-affected | 0.3.7.beta-20 |
| esm-apps/xenial | released | 0.3.7.beta-19ubuntu0.1 |
| esm-infra-legacy/trusty | released | 0.3.7.beta-17+deb8u1build0.14.04.1 |
Показывать по
EPSS
9.3 Critical
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit ...
sniffit 0.3.7 and prior: A configuration file can be leveraged to execute code as root
EPSS
9.3 Critical
CVSS2
7.8 High
CVSS3