CVE-2017-1000249

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

5.5medium3.x
0246810

CVSS Score: 5.5/10

All CVSS Scores

CVSS 3.x
5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS 2.0
2.1

Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Description

An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-119

Vulnerable Software (7)

Type: Configuration

Product: file

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: file

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: file

Operating System: ubuntu zesty 17.04

Trait:
{  "fixed": "1:5.29-3ubuntu0.1"}

Source: ubuntu

Type: Configuration

Product: file

Operating System: debian

Trait:
{  "fixed": "1:5.32-1"}

Source: debian

Type: Configuration

Product: file

Operating System: debian jessie 8

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: file

Operating System: debian wheezy 7

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: file_project

Product: file

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:file_project:file:5.29:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd