CVE-2011-3630
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
26/11/2019
Last modified:
21/11/2024
Description
Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:hardlink_project:hardlink:*:*:*:*:*:*:*:* | 0.1.2 (excluding) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/security/cve/cve-2011-3630
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630
- https://security-tracker.debian.org/tracker/CVE-2011-3630
- https://www.openwall.com/lists/oss-security/2011/10/20/6
- https://access.redhat.com/security/cve/cve-2011-3630
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630
- https://security-tracker.debian.org/tracker/CVE-2011-3630
- https://www.openwall.com/lists/oss-security/2011/10/20/6



