partclone.restore in Partclone 0.2.87 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the partclone image header. An attacker may be able to execute arbitrary code in the context of the user running the affected application.
References
Link | Resource |
---|---|
https://github.com/Thomas-Tsai/partclone/issues/82 | Issue Tracking Third Party Advisory |
https://github.com/Thomas-Tsai/partclone/issues/82 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Thomas-Tsai/partclone/issues/82 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-05-02 23:29
Updated : 2024-11-21 02:44
NVD link : CVE-2016-10721
Mitre link : CVE-2016-10721
CVE.ORG link : CVE-2016-10721
JSON object : View
Products Affected
partclone
- partclone
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer