// For flags

CVE-2012-4025

 

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.

Un desbordamiento de entero en la función queue_init en unsquashfs.c en unsquashfs en Squashfs v4.2 y anteriores permite a atacantes remotos ejecutar código de su elección a través de un campo block_log diseñado para tal fin en el superbloque de un archivo .sqsh, dando lugar a un desbordamiento de búfer basado en memoria dinámica (heap).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-07-16 CVE Reserved
  • 2012-07-19 CVE Published
  • 2024-02-17 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-190: Integer Overflow or Wraparound
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Squashfs Project
Search vendor "Squashfs Project"
Squashfs
Search vendor "Squashfs Project" for product "Squashfs"
<= 4.2
Search vendor "Squashfs Project" for product "Squashfs" and version " <= 4.2"
-
Affected