HIGH · 8.8

CVE-2011-3630

Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a speciall...

Vulnerability Description

Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Hardlink ProjectHardlink< 0.1.2
DebianDebian Linux8.0
RedhatEnterprise Linux5.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-3630?

CVE-2011-3630 is a vulnerability with a CVSS score of 8.8 (HIGH). Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a speciall...

How severe is CVE-2011-3630?

CVE-2011-3630 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-3630?

Check the references section above for vendor advisories and patch information. Affected products include: Hardlink Project Hardlink, Debian Debian Linux, Redhat Enterprise Linux.