Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3933-1 dmitry security update
EUVD EUVD EUVD-2017-16909 Stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T21:44:05.774Z

Reserved: 2017-04-18T00:00:00.000Z

Link: CVE-2017-7938

cve-icon Vulnrichment

Updated: 2025-11-03T21:44:05.774Z

cve-icon NVD

Status : Deferred

Published: 2017-04-20T14:59:00.223

Modified: 2025-11-03T22:15:44.180

Link: CVE-2017-7938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.