Heap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via an empty username in the "Author" field in a commit.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.zx2c4.com/cgit/commit/?id=7757d1b046ecb67b830151d20715c658867df1ec - | |
References | () http://hjemli.net/pipermail/cgit/2012-July/000652.html - | |
References | () http://secunia.com/advisories/50734 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2012/09/30/1 - | |
References | () http://www.openwall.com/lists/oss-security/2012/10/03/7 - | |
References | () http://www.securityfocus.com/bid/55724 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=820733 - |
Information
Published : 2012-10-10 18:55
Updated : 2024-11-21 01:42
NVD link : CVE-2012-4465
Mitre link : CVE-2012-4465
CVE.ORG link : CVE-2012-4465
JSON object : View
Products Affected
lars_hjemli
- cgit
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer