First published: Sat Oct 15 2011(Updated: )
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/hardlink | 0.3.2 | |
CentOS Hardlink | <0.1.2 | |
Red Hat Enterprise Linux | =6.0 | |
Debian | =8.0 | |
Red Hat Enterprise Linux | =5.0 | |
Debian | =9.0 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3631 has a severity rating that indicates it poses a risk of heap-based buffer overflows due to integer overflows.
To remediate CVE-2011-3631, upgrade hardlink to version 0.3.2 or later.
CVE-2011-3631 affects versions of hardlink before 0.1.2 across various Linux distributions including Debian and Red Hat Enterprise Linux.
Yes, a remote attacker could exploit CVE-2011-3631 using a specially-crafted directory tree.
CVE-2011-3631 showcases integer overflows leading to heap-based buffer overflows due to improper memory space calculations.