First published: Thu Jul 19 2012(Updated: )
Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squashfs | <=4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4024 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2012-4024, upgrade Squashfs to version 4.3 or later.
CVE-2012-4024 allows remote attackers to execute arbitrary code via a crafted list file.
CVE-2012-4024 affects Squashfs 4.2 and earlier versions.
The attack vector for CVE-2012-4024 involves using a crafted file for the -ef option in Squashfs.