CVE-2018-25222

NameCVE-2018-25222
DescriptionSC v7.16 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding 1052 bytes to overwrite the instruction pointer and execute shellcode in the application context.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sc (PTS)bullseye7.16-4vulnerable
bookworm7.16-4.1vulnerable
trixie7.16-1.1.2-1vulnerable
forky, sid7.16-1.1.3-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
scsource(unstable)(unfixed)unimportant

Notes

https://www.exploit-db.com/exploits/44279
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems