First published: Mon Sep 19 2016(Updated: )
Stack-based buffer overflow in the extractTree function in unADF allows remote attackers to execute arbitrary code via a long pathname.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/unadf | <=0.7.11a-3<=0.7.11a-4 | 0.7.11a-3+deb8u1 0.7.11a-6 0.7.11a-5+deb12u1 |
debian/unadf | 0.7.11a-4+deb11u1 0.7.11a-5+deb12u1 0.7.11a-7 | |
Debian | =7.0 | |
Debian | =8.0 | |
Unadf Project Unadf | =1.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
unADF project unADF | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.