Логотип exploitDog
bind:CVE-2011-3631
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-3631

Количество 5

Количество 5

ubuntu логотип

CVE-2011-3631

около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2011-3631

больше 14 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS2: 4.1
EPSS: Низкий
nvd логотип

CVE-2011-3631

около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2011-3631

около 6 лет назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-b ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-j3j5-x3ff-v276

почти 4 года назад

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-3631

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
4%
Низкий
около 6 лет назад
redhat логотип
CVE-2011-3631

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS2: 4.1
4%
Низкий
больше 14 лет назад
nvd логотип
CVE-2011-3631

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

CVSS3: 8.8
4%
Низкий
около 6 лет назад
debian логотип
CVE-2011-3631

Hardlink before 0.1.2 has multiple integer overflows leading to heap-b ...

CVSS3: 8.8
4%
Низкий
около 6 лет назад
github логотип
GHSA-j3j5-x3ff-v276

Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.

4%
Низкий
почти 4 года назад

Уязвимостей на страницу