CVE-2008-4933

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

7.8high2.0
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 2.0
7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Description

Buffer overflow in the hfsplus_find_cat function in fs/hfsplus/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfsplus filesystem image with an invalid catalog namelength field, related to the hfsplus_cat_build_key_uni function.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-119

Related Vulnerabilities

BDU:2015-00886BDU:2015-01470BDU:2015-01471BDU:2015-01472BDU:2015-01473BDU:2015-01474BDU:2015-01475BDU:2015-01476BDU:2015-01477BDU:2015-01478BDU:2015-01479BDU:2015-01480BDU:2015-01481BDU:2015-01482BDU:2015-01483BDU:2015-01484BDU:2015-01485BDU:2015-01486BDU:2015-01487BDU:2015-01488BDU:2015-01489BDU:2015-01490BDU:2015-01491BDU:2015-01492BDU:2015-01493BDU:2015-01494BDU:2015-01495BDU:2015-01496BDU:2015-01497BDU:2015-01498BDU:2015-01499BDU:2015-01500BDU:2015-01501BDU:2015-01502BDU:2015-01503BDU:2015-01504BDU:2015-01505BDU:2015-01506BDU:2015-01507BDU:2015-01508BDU:2015-01509BDU:2015-01510BDU:2015-01511BDU:2015-01512BDU:2015-01513BDU:2015-01514BDU:2015-01515BDU:2015-01516BDU:2015-01517BDU:2015-01518BDU:2015-01519BDU:2015-01520BDU:2015-01521BDU:2015-01522BDU:2015-01523BDU:2015-01524BDU:2015-01525BDU:2015-01526BDU:2015-01527BDU:2015-01528BDU:2015-01529BDU:2015-01530BDU:2015-01531BDU:2015-01532BDU:2015-01533BDU:2015-01534BDU:2015-01535BDU:2015-01536BDU:2015-01537BDU:2015-01538BDU:2015-01539BDU:2015-01540BDU:2015-01541BDU:2015-01542BDU:2015-01543BDU:2015-01544BDU:2015-01545BDU:2015-01546BDU:2015-01547BDU:2015-01548BDU:2015-01549BDU:2015-01550BDU:2015-01551BDU:2015-01552BDU:2015-01553BDU:2015-01554BDU:2015-01555BDU:2015-01556BDU:2015-01557BDU:2015-01558BDU:2015-01559BDU:2015-01560BDU:2015-01561BDU:2015-01562BDU:2015-01563BDU:2015-01564BDU:2015-01565BDU:2015-01566BDU:2015-01567BDU:2015-01568BDU:2015-01569BDU:2015-01570BDU:2015-01571BDU:2015-01572BDU:2015-01573BDU:2015-01574BDU:2015-01575BDU:2015-01576BDU:2015-01577BDU:2015-01578BDU:2015-01579BDU:2015-01580BDU:2015-01581BDU:2015-01582BDU:2015-01583BDU:2015-01584BDU:2015-01585BDU:2015-01586BDU:2015-01587BDU:2015-01588BDU:2015-01589BDU:2015-01590BDU:2015-01591BDU:2015-01592BDU:2015-01593BDU:2015-01594

Vulnerable Software (4)

Type: Configuration

Product: linux

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "2.6.24-22.45"}

Source: ubuntu

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "fixed": "2.6.26-11"}

Source: debian

Type: Configuration

Product: linux-2.6.24

Operating System: debian

Trait:
{  "fixed": "2.6.24-6~etchnhalf.7"}

Source: debian

Type: Configuration

Vendor: linux

Product: linux_kernel

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.6.28",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:lin...

Source: nvd