Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-23804

Опубликовано: 16 фев. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

esm-apps/bionic

released

4.0.7+dfsg1-1ubuntu2+esm1
esm-apps/focal

released

5.1.5+dfsg1-2ubuntu0.1~esm1
esm-apps/jammy

not-affected

esm-apps/noble

not-affected

esm-apps/xenial

ignored

changes too intrusive
focal

ignored

end of standard support, was needed
impish

ignored

end of life
jammy

not-affected

Показывать по

EPSS

Процентиль: 76%
0.00949
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
почти 4 года назад

A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 7.8
debian
почти 4 года назад

A stack-based buffer overflow vulnerability exists in the Gerber Viewe ...

CVSS3: 7.8
github
почти 4 года назад

A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

EPSS

Процентиль: 76%
0.00949
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3