Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2017040113 | Exploit Third Party Advisory |
https://github.com/jaygreig86/dmitry/pull/12 | |
https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41898/ |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-04-20 14:59
Updated : 2024-07-03 01:35
NVD link : CVE-2017-7938
Mitre link : CVE-2017-7938
CVE.ORG link : CVE-2017-7938
JSON object : View
Products Affected
mor-pah.net
- dmitry_deepmagic_information_gathering_tool
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer