partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.
References
Link | Resource |
---|---|
https://github.com/Thomas-Tsai/partclone/issues/71 | Issue Tracking Third Party Advisory |
https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-05-02 16:29
Updated : 2019-10-04 09:24
NVD link : CVE-2016-10722
Mitre link : CVE-2016-10722
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
partclone_project
- partclone