Vulnerability Details : CVE-2015-2831
Buffer overflow in das_watchdog 0.9.0 allows local users to execute arbitrary code with root privileges via a large string in the XAUTHORITY environment variable.
Vulnerability category: OverflowExecute code
Products affected by CVE-2015-2831
- cpe:2.3:a:das_watchdog_project:das_watchdog:0.9.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-2831
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2831
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2015-2831
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2831
-
https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577253febfb690
Fix memory overflow if the name of an environment is larger than 500 … · kmatheussen/das_watchdog@bd20bb0 · GitHub
-
http://www.openwall.com/lists/oss-security/2015/04/02/13
oss-security - Re: CVE request: Buffer overflow in das_watchdog
-
http://www.debian.org/security/2015/dsa-3221
Debian -- Security Information -- DSA-3221-1 das-watchdog
-
http://www.openwall.com/lists/oss-security/2015/04/01/8
oss-security - CVE request: Buffer overflow in das_watchdog
-
http://www.securityfocus.com/bid/73706
das_watchdog 'XAUTHORITY' Environment Variable Handling Buffer Overflow Vulnerability
Jump to