Vulnerability Details : CVE-2024-0911
A flaw was found in indent, a program for formatting C code. This issue may allow an attacker to trick a user into processing a specially crafted file to trigger a heap-based buffer overflow, causing the application to crash.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2024-0911
- cpe:2.3:a:gnu:indent:2.2.13:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-0911
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-0911
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2024-02-14 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
Fedora Project | 2024-02-06 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
Fedora Project | 2024-02-14 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-0911 | 2024-01-26 |
CWE ids for CVE-2024-0911
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: patrick@puiterwijk.org (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2024-0911
-
https://access.redhat.com/security/cve/CVE-2024-0911
CVE-2024-0911- Red Hat Customer PortalThird Party Advisory
-
https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html
HEAP BUFFER OVERFLOW BUG
-
https://bugzilla.redhat.com/show_bug.cgi?id=2260399
2260399 – (CVE-2024-0911) CVE-2024-0911 indent: heap-based buffer overflow in set_buf_break()Issue Tracking
Jump to