Vulnerability Details : CVE-2020-24827
Potential exploit
A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2020-24827
- cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-24827
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-24827
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
References for CVE-2020-24827
-
https://github.com/aclements/libelfin/issues/47
SEGV in function dwarf::cursor::skip_form at dwarf/cursor.cc:181 · Issue #47 · aclements/libelfin · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc181
function_bugs/libelfin at master · xiaoxiongwang/function_bugs · GitHubExploit;Third Party Advisory
Jump to