CVE-2011-3631
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
Hardlink versiones anteriores a 0.1.2, presenta múltiples desbordamientos de enteros que conllevan a desbordamientos de búfer en la región heap de la memoria debido a la manera en que se realiza la concatenación de las longitudes de cadena en el cálculo del espacio de memoria requerido para ser usado. Un atacante remoto podría proveer un árbol de directorios especialmente diseñado y engañar al usuario local para consolidarlo, conllevando a un bloqueo del ejecutable de hardlink o una ejecución de código potencialmente arbitraria con privilegios de usuario.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-09-21 CVE Reserved
- 2019-11-26 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://access.redhat.com/security/cve/cve-2011-3631 | Third Party Advisory | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516 | Issue Tracking | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3631 | Issue Tracking | |
https://security-tracker.debian.org/tracker/CVE-2011-3631 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hardlink Project Search vendor "Hardlink Project" | Hardlink Search vendor "Hardlink Project" for product "Hardlink" | < 0.1.2 Search vendor "Hardlink Project" for product "Hardlink" and version " < 0.1.2" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 5.0 Search vendor "Redhat" for product "Enterprise Linux" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Affected
|