CVE-2012-4024

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-4024
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2012-4024.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2012-4024
Related
Published
2012-07-19T19:55:02Z
Modified
2024-11-21T01:42:03Z
Summary
[none]
Details

Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.

References

Affected packages

Debian:11 / squashfs-tools

Package

Name
squashfs-tools
Purl
pkg:deb/debian/squashfs-tools?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2+20121212-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / squashfs-tools

Package

Name
squashfs-tools
Purl
pkg:deb/debian/squashfs-tools?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2+20121212-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / squashfs-tools

Package

Name
squashfs-tools
Purl
pkg:deb/debian/squashfs-tools?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2+20121212-1

Ecosystem specific

{
    "urgency": "low"
}