5 results (0.040 seconds)

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

In version 4.8.0 and earlier of The Sleuth Kit (TSK), there is a stack buffer overflow vulnerability in the YAFFS file timestamp parsing logic in yaffsfs_istat() in fs/yaffs.c. En la versión 4.8.0 y anteriores de The Sleuth Kit (TSK), se presenta una vulnerabilidad de desbordamiento del búfer de la pila en la lógica de análisis de marca de tiempo de archivo YAFFS en la función yaffsfs_istat() en el archivo fs/yaffs.c. • https://github.com/sleuthkit/sleuthkit/commit/459ae818fc8dae717549810150de4d191ce158f1 https://lists.debian.org/debian-lts-announce/2020/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EY53OYU7UZLAJWNIVVNR3EX2RNCCFTB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQR2QY3IAF2IG6HGBSKGL66VUDOTC3OA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorap • CWE-787: Out-of-bounds Write •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

In version 4.8.0 and earlier of The Sleuth Kit (TSK), there is a heap-based buffer over-read in ntfs_dinode_lookup in fs/ntfs.c. En la versión 4.8.0 y anteriores de The Sleuth Kit (TSK), se presenta una lectura excesiva de búfer en la región heap de la memoria en la función ntfs_dinode_lookup en el archivo fs/ntfs.c. • https://github.com/sleuthkit/sleuthkit/issues/1829 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EY53OYU7UZLAJWNIVVNR3EX2RNCCFTB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQR2QY3IAF2IG6HGBSKGL66VUDOTC3OA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFQKIE5U3LS5U7POPGS7YHLUSW2URWGJ • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

The Sleuth Kit 4.6.0 and earlier is affected by: Integer Overflow. The impact is: Opening crafted disk image triggers crash in tsk/fs/hfs_dent.c:237. The component is: Overflow in fls tool used on HFS image. Bug is in tsk/fs/hfs.c file in function hfs_cat_traverse() in lines: 952, 1062. The attack vector is: Victim must open a crafted HFS filesystem image. • https://github.com/sleuthkit/sleuthkit/commit/114cd3d0aac8bd1aeaf4b33840feb0163d342d5b https://issuetracker.google.com/issues/77809383 https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VXDAP6SEO3RCDCZITTFGNZGSVPE5CTY https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGWCQIZKTDCJO4YGL5LGPYFNOVU7SJRX • CWE-190: Integer Overflow or Wraparound •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c). En The Sleuth Kit (TSK) hasta la version 4.6.4, hfs_cat_traverse en tsk/fs/hfs.c no determina correctamente cuando una longitud de clave es demasiado grande, lo que permite a los atacantes causar una denegación de servicio (SEGV en dirección desconocida con acceso de memoria READ en una llamada tsk_getu16 en hfs_dir_open_meta_cb en tsk/fs/hfs_dent.c). • https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d https://github.com/sleuthkit/sleuthkit/pull/1374 https://lists.debian.org/debian-lts-announce/2018/12/msg00008.html https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZXFYOOMSP7NWRTSO4XXGHXAY3CJNAJ6 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLSVLDQLPGKRHHBPYUXVJJPAID6CYBXD • CWE-125: Out-of-bounds Read •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

Use-after-free vulnerability in ext2fs.c in Brian Carrier The Sleuth Kit (TSK) before 2.09 allows user-assisted remote attackers to cause a denial of service (application crash) and prevent examination of certain ext2fs files via a malformed ext2fs image. Vulnerabilidad de uso después de liberación en ext2fs.c de Brian Carrier The Sleuth Kit (TSK) anterior a 2.09 permite a atacantes remotos con la intervención del usuario provocar una denegación de servicio (caída de la aplicación) y evitar el examen de determinados archivos ext2fs mediante una imagen ext2fs mal formada. • http://osvdb.org/47000 http://sourceforge.net/mailarchive/message.php?msg_name=A19F11EF-13CA-4940-AFF3-9BE08F67EE22%40sleuthkit.org http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper.v1_1.BH2007.pdf http://www.securityfocus.com/archive/1/474809/100/0/threaded http://www.securityfocus.com/archive/1/475335/100/0/threaded http://www.securityfocus.com/bid/25181 •