HIGH · 7.5

CVE-2008-3546

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the s...

Vulnerability Description

Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
LinuxParduslinux2007
GitGit1.5.5.3

Related Weaknesses (CWE)

References

FAQ

What is CVE-2008-3546?

CVE-2008-3546 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the s...

How severe is CVE-2008-3546?

CVE-2008-3546 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2008-3546?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Parduslinux, Git Git.