Vulnerability Description
partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Partclone Project | Partclone | < 0.2.88 |
Related Weaknesses (CWE)
References
- https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflExploitThird Party Advisory
- https://github.com/Thomas-Tsai/partclone/issues/71Issue TrackingThird Party Advisory
- https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflExploitThird Party Advisory
- https://github.com/Thomas-Tsai/partclone/issues/71Issue TrackingThird Party Advisory
FAQ
What is CVE-2016-10722?
CVE-2016-10722 is a vulnerability with a CVSS score of 9.8 (CRITICAL). partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An ...
How severe is CVE-2016-10722?
CVE-2016-10722 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10722?
Check the references section above for vendor advisories and patch information. Affected products include: Partclone Project Partclone.