Untriaged
Permalink
CVE-2018-25224
8.4 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
PMS 0.42 Stack-Based Buffer Overflow via Configuration File
PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.
References
-
ExploitDB-44426 exploit
-
Official Product Homepage product
-
VulnCheck Advisory: PMS 0.42 Stack-Based Buffer Overflow via Configuration File third-party-advisory
Affected products
PMS
- ==0.42
Matching in nixpkgs
pkgs.pms
Interactive Vim-like console client for MPD
-
nixos-unstable 2022-11-12
- nixpkgs-unstable 2022-11-12
- nixos-unstable-small 2022-11-12
-
nixos-25.11 2022-11-12
- nixos-25.11-small 2022-11-12
- nixpkgs-25.11-darwin 2022-11-12
pkgs.libtpms
Libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0)
pkgs.dpms-off
Turn off monitors to save power (for Wayland)
pkgs.python312Packages.pmsensor
Library to read data from environment sensors
pkgs.python313Packages.pmsensor
Library to read data from environment sensors
pkgs.python314Packages.pmsensor
Library to read data from environment sensors
Package maintainers
-
@philiptaron Philip Taron <philip.taron@gmail.com>
-
@baloo Arthur Gautier <nixpkgs@superbaloo.net>
-
@deejayem David Morgan <nixpkgs.bu5hq@simplelogin.com>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>