6.8 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.02 Low
EPSS
Percentile
88.8%
Use-after-free vulnerability in ext2fs.c in Brian Carrier The Sleuth Kit (TSK) before 2.09 allows user-assisted remote attackers to cause a denial of service (application crash) and prevent examination of certain ext2fs files via a malformed ext2fs image.
CPE | Name | Operator | Version |
---|---|---|---|
the_sleuth_kit:the_sleuth_kit | the sleuth kit | le | 2.08 |
osvdb.org/47000
sourceforge.net/mailarchive/message.php?msg_name=A19F11EF-13CA-4940-AFF3-9BE08F67EE22%40sleuthkit.org
www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf
www.securityfocus.com/archive/1/474809/100/0/threaded
www.securityfocus.com/archive/1/475335/100/0/threaded
www.securityfocus.com/bid/25181