Vulnerability Details : CVE-2015-3239
Potential exploit
Off-by-one error in the dwarf_to_unw_regnum function in include/dwarf_i.h in libunwind 1.1 allows local users to have unspecified impact via invalid dwarf opcodes.
Products affected by CVE-2015-3239
- cpe:2.3:a:libunwind_project:libunwind:1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3239
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3239
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
3.4
|
4.9
|
NIST |
CWE ids for CVE-2015-3239
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3239
-
http://rhn.redhat.com/errata/RHSA-2015-1675.html
RHSA-2015:1675 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1768.html
RHSA-2015:1768 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=1232265
1232265 – (CVE-2015-3239) CVE-2015-3239 libunwind: off-by-one in dwarf_to_unw_regnum()Exploit
-
http://git.savannah.gnu.org/cgit/libunwind.git/commit/?id=396b6c7ab737e2bff244d640601c436a26260ca1
libunwind.git - Libunwind repository. Project page: http://www.nongnu.org/libunwind/
-
http://www.securityfocus.com/bid/76707
libunwind 'dwarf_to_unw_regnum()' Function Local Security Bypass Vulnerability
-
http://rhn.redhat.com/errata/RHSA-2015-1769.html
RHSA-2015:1769 - Security Advisory - Red Hat Customer Portal
Jump to