Untriaged
Permalink
CVE-2016-20044
8.4 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
PInfo 0.6.9-5.1 Local Buffer Overflow via -m Parameter
PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -m parameter. Attackers can craft a malicious input string with 564 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges.
References
-
ExploitDB-40023 exploit
-
Official Product Homepage product
-
VulnCheck Advisory: PInfo 0.6.9-5.1 Local Buffer Overflow via -m Parameter third-party-advisory
Affected products
PInfo
- ==0.6.9-5.1
Matching in nixpkgs
pkgs.pinfo
Viewer for info files
Package maintainers
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>