CVE-2024-55577

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-55577
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-55577.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-55577
Related
Published
2025-01-15T06:15:16Z
Modified
2025-01-22T06:45:30.046634Z
Summary
[none]
Details

Stack-based buffer overflow vulnerability exists in Linux Ratfor 1.06 and earlier. When the software processes a file which is specially crafted by an attacker, arbitrary code may be executed. As a result, the attacker may obtain or alter information of the user environment or cause the user environment to become unusable.

References

Affected packages

Debian:11 / ratfor

Package

Name
ratfor
Purl
pkg:deb/debian/ratfor?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.05-1
1.05-2
1.06-1
1.07-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ratfor

Package

Name
ratfor
Purl
pkg:deb/debian/ratfor?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.05-2
1.06-1
1.07-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ratfor

Package

Name
ratfor
Purl
pkg:deb/debian/ratfor?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.07-1

Affected versions

1.*

1.05-2
1.06-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}