7.4 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.019 Low
EPSS
Percentile
88.6%
Buffer overflow in the inotifytools_snprintf function in src/inotifytools.c in the inotify-tools library before 3.11 allows context-dependent attackers to execute arbitrary code via a long filename.
CPE | Name | Operator | Version |
---|---|---|---|
inotify:inotify-tools | inotify inotify-tools | le | 3.10 |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=443913
osvdb.org/40563
secunia.com/advisories/26825
secunia.com/advisories/27616
secunia.com/advisories/28221
sourceforge.net/project/shownotes.php?release_id=540277&group_id=171752
www.debian.org/security/2007/dsa-1440
www.securityfocus.com/bid/25724
exchange.xforce.ibmcloud.com/vulnerabilities/36687
www.redhat.com/archives/fedora-package-announce/2007-November/msg00228.html