4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.018 Low
EPSS
Percentile
88.4%
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a
certain memory location as the holder of a loop iteration count, which
allows user-assisted remote attackers to cause a denial of service (long
loop) and prevent examination of certain NTFS files via a malformed NTFS
image.