An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted journal file can cause an integer underflow resulting in code execution. An attacker can construct a malicious journal file to trigger this vulnerability.
References
Configurations
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.5 |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html - | |
References | () http://www.securityfocus.com/bid/100543 - Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/202004-05 - | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0303 - Third Party Advisory |
Information
Published : 2017-09-05 18:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-2807
Mitre link : CVE-2017-2807
CVE.ORG link : CVE-2017-2807
JSON object : View
Products Affected
ledger-cli
- ledger
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer