CVE-2021-3548

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-3548
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3548.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-3548
Related
Published
2021-05-26T21:15:08Z
Modified
2025-01-08T08:09:50.499287Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in dmg2img through 20170502. dmg2img did not validate the size of the read buffer during memcpy() inside the main() function. This possibly leads to memory layout information leaking in the data. This might be used in a chain of vulnerability in order to reach code execution.

References

Affected packages

Debian:11 / dmg2img

Package

Name
dmg2img
Purl
pkg:deb/debian/dmg2img?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6.7-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / dmg2img

Package

Name
dmg2img
Purl
pkg:deb/debian/dmg2img?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6.7-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / dmg2img

Package

Name
dmg2img
Purl
pkg:deb/debian/dmg2img?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6.7-1

Ecosystem specific

{
    "urgency": "unimportant"
}