Vulnerabilities (CVE)

Filtered by vendor Nasa Subscribe
Filtered by product Cfitsio
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-1010060 1 Nasa 1 Cfitsio 2024-11-21 7.5 HIGH 9.8 CRITICAL
NASA CFITSIO prior to 3.43 is affected by: Buffer Overflow. The impact is: arbitrary code execution. The component is: over 40 source code files were changed. The attack vector is: remote unauthenticated attacker. The fixed version is: 3.43. NOTE: this CVE refers to the issues not covered by CVE-2018-3846, CVE-2018-3847, CVE-2018-3848, and CVE-2018-3849. One example is ftp_status in drvrnet.c mishandling a long string beginning with a '4' character.
CVE-2018-3849 2 Fedoraproject, Nasa 2 Fedora, Cfitsio 2024-11-21 6.8 MEDIUM 8.8 HIGH
In the ffghtb function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
CVE-2018-3848 2 Fedoraproject, Nasa 2 Fedora, Cfitsio 2024-11-21 6.8 MEDIUM 8.8 HIGH
In the ffghbn function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
CVE-2018-3847 1 Nasa 1 Cfitsio 2024-11-21 6.8 MEDIUM 8.8 HIGH
Multiple exploitable buffer overflow vulnerabilities exist in image parsing functionality of the CFITSIO library version 3.42. Specially crafted images parsed via the library, can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
CVE-2018-3846 2 Fedoraproject, Nasa 2 Fedora, Cfitsio 2024-11-21 6.8 MEDIUM 8.8 HIGH
In the ffgphd and ffgtkn functions in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.