Логотип exploitDog
bind:CVE-2021-45423
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-45423

Количество 4

Количество 4

ubuntu логотип

CVE-2021-45423

почти 3 года назад

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2021-45423

почти 3 года назад

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2021-45423

почти 3 года назад

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports f ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4r8p-6r2m-cjwv

почти 3 года назад

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-45423

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.

CVSS3: 9.8
1%
Низкий
почти 3 года назад
nvd логотип
CVE-2021-45423

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.

CVSS3: 9.8
1%
Низкий
почти 3 года назад
debian логотип
CVE-2021-45423

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports f ...

CVSS3: 9.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-4r8p-6r2m-cjwv

A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.

CVSS3: 9.8
1%
Низкий
почти 3 года назад

Уязвимостей на страницу