CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
EPSS
Percentile
88.3%
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a certain memory location as the holder of a loop iteration count, which allows user-assisted remote attackers to cause a denial of service (long loop) and prevent examination of certain NTFS files via a malformed NTFS image.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | sleuthkit | < 2.09-1 | sleuthkit_2.09-1_all.deb |
Debian | 11 | all | sleuthkit | < 2.09-1 | sleuthkit_2.09-1_all.deb |
Debian | 999 | all | sleuthkit | < 2.09-1 | sleuthkit_2.09-1_all.deb |
Debian | 13 | all | sleuthkit | < 2.09-1 | sleuthkit_2.09-1_all.deb |