Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-16395

Опубликовано: 17 сент. 2019
Источник: ubuntu
Приоритет: low
CVSS2: 6.8
CVSS3: 7.8

Описание

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

4.0~early~20200606-3
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/focal

needs-triage

esm-apps/jammy

not-affected

4.0~early~20200606-3
esm-apps/noble

not-affected

4.0~early~20200606-3
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage
groovy

not-affected

4.0~early~20200606-3

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

Показывать по

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 6 лет назад

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.

CVSS3: 7.8
debian
больше 6 лет назад

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() functi ...

github
больше 3 лет назад

GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() function in cobc/tree.c via crafted COBOL source code.

6.8 Medium

CVSS2

7.8 High

CVSS3