Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2019-11-26T03:22:40
Updated: 2024-08-06T23:37:48.560Z
Reserved: 2011-09-21T00:00:00
Link: CVE-2011-3631
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-11-26T04:15:11.013
Modified: 2024-11-21T01:30:53.213
Link: CVE-2011-3631
Redhat