Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3548

Опубликовано: 26 мая 2021
Источник: ubuntu
Приоритет: low
CVSS2: 5.8
CVSS3: 7.1

Описание

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

needed

esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

needed

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

5.8 Medium

CVSS2

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

CVSS3: 7.1
debian
больше 4 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate ...

github
больше 3 лет назад

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость функции main() инструмента для конвертирования сжатых файлов dmgdmg2img, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании

5.8 Medium

CVSS2

7.1 High

CVSS3