Описание
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 0.7-4ubuntu0.1 |
| devel | not-affected | 0.7-7 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/xenial | released | 0.7-1ubuntu0.1 |
| precise/esm | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | released | 0.7-7 |
| xenial | released | 0.7-1ubuntu0.1 |
| zesty | ignored | end of life |
Показывать по
EPSS
6.8 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be e ...
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
EPSS
6.8 Medium
CVSS2
7.8 High
CVSS3