Lucene search

K
redosRedosROS-20240911-09
HistorySep 11, 2024 - 12:00 a.m.

ROS-20240911-09

2024-09-1100:00:00
redos.red-soft.ru
21
vulnerability
buffer overrun
pkgconf_tuple_parse
libpkgconf
memory exploitation
denial of service
.pc file
unix

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

36.6%

Vulnerability of the pkgconf_tuple_parse function (libpkgconf/tuple.c) of the software tool for setting flags for pkgconf development libraries is related to a buffer overrun.
compiler and linker flags for pkgconf development libraries is related to the operation exceeding the buffer boundaries.
in memory Exploitation of the vulnerability could allow an attacker to cause a denial of service with a
specially crafted .pc file

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64pkgconf< 1.7.3-3UNKNOWN

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

36.6%