Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2017040113 | Exploit Third Party Advisory |
https://github.com/jaygreig86/dmitry/pull/12 | |
https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41898/ |
Configurations
Configuration 1 (hide)
|
History
03 Jul 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 6.6 |
30 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2017-04-20 14:59
Updated : 2024-07-03 01:35
NVD link : CVE-2017-7938
Mitre link : CVE-2017-7938
CVE.ORG link : CVE-2017-7938
JSON object : View
Products Affected
mor-pah.net
- dmitry_deepmagic_information_gathering_tool
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer