In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-11-29 23:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-19497
Mitre link : CVE-2018-19497
CVE.ORG link : CVE-2018-19497
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
sleuthkit
- the_sleuth_kit
CWE
CWE-125
Out-of-bounds Read