Vulnerability Name: | CVE-2021-32435 (CCN-222067) | ||||||||||||
Assigned: | 2021-04-26 | ||||||||||||
Published: | 2021-04-26 | ||||||||||||
Updated: | 2022-04-25 | ||||||||||||
Summary: | Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32435 Source: XF Type: UNKNOWN abcm2ps-cve202132435-dos(222067) Source: MISC Type: Patch, Third Party Advisory https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/leesavide/abcm2ps/issues/84 Source: CCN Type: abcm2ps GIT Repository stack buffer overflow in function get_key() in parse.c #84 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20220417 [SECURITY] [DLA 2983-1] abcm2ps security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-68d22975a4 Source: FEDORA Type: Issue Tracking, Third Party Advisory FEDORA-2022-93025de981 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-6b46927596 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||
BACK |