Lucene search

K
cve[email protected]CVE-2007-6181
HistoryNov 30, 2007 - 12:46 a.m.

CVE-2007-6181

2007-11-3000:46:00
CWE-119
web.nvd.nist.gov
29
cve-2007-6181
cygwin
buffer overflow
security
nvd
vulnerability
scp protocol

6.8 Medium

AI Score

Confidence

Low

8.5 High

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.023 Low

EPSS

Percentile

89.8%

Heap-based buffer overflow in cygwin1.dll in Cygwin 1.5.7 and earlier allows context-dependent attackers to execute arbitrary code via a filename with a certain length, as demonstrated by a remote authenticated user who uses the SCP protocol to send a file to the Cygwin machine, and thereby causes scp.exe on this machine to execute, and then overwrite heap memory with characters from the filename. NOTE: it is also reported that a related issue might exist in 1.5.7 through 1.5.19.

Affected configurations

NVD
Node
redhatcygwinRange1.5.19
CPENameOperatorVersion
redhat:cygwinredhat cygwinle1.5.19

6.8 Medium

AI Score

Confidence

Low

8.5 High

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.023 Low

EPSS

Percentile

89.8%

Related for CVE-2007-6181