Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1000052

Опубликовано: 09 фев. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 7.5

Описание

fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7.

РелизСтатусПримечание
artful

DNE

bionic

ignored

end of standard support, was needs-triage
cosmic

ignored

end of life
devel

not-affected

5.2.1+ds-2
disco

not-affected

5.2.1+ds-2
eoan

not-affected

5.2.1+ds-2
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

5.2.1+ds-2
esm-apps/jammy

not-affected

5.2.1+ds-2
esm-apps/noble

not-affected

5.2.1+ds-2

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 8 лет назад

fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7.

CVSS3: 7.5
debian
почти 8 лет назад

fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890a ...

CVSS3: 7.5
github
больше 3 лет назад

fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7.

5 Medium

CVSS2

7.5 High

CVSS3