CVE-2017-7938

NameCVE-2017-7938
DescriptionStack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3933-1
Debian Bugs1070370

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dmitry (PTS)bullseye1.3a-1.1vulnerable
bullseye (security)1.3a-1.1+deb11u1fixed
bookworm1.3a-1.2+deb12u1fixed
sid, trixie1.3a-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dmitrysourcebullseye1.3a-1.1+deb11u1DLA-3933-1
dmitrysourcebookworm1.3a-1.2+deb12u1
dmitrysource(unstable)1.3a-51070370

Notes

[buster] - dmitry <postponed> (Minor issue, crash in CLI tool, requires malicious parameter)
https://packetstormsecurity.com/files/142210/Dmitry-1.3a-Local-Stack-Buffer-Overflow.html
https://github.com/jaygreig86/dmitry/pull/12

Search for package or bug name: Reporting problems