Vulnerability Description
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
CVSS Score
5.5
MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| File Project | File | 5.41 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2024/Mar/21
- http://seclists.org/fulldisclosure/2024/Mar/24
- http://seclists.org/fulldisclosure/2024/Mar/25
- https://bugs.astron.com/view.php?id=310ExploitVendor Advisory
- https://security.netapp.com/advisory/ntap-20231116-0002/Third Party Advisory
- https://support.apple.com/kb/HT214081
- https://support.apple.com/kb/HT214084
- https://support.apple.com/kb/HT214086
- https://support.apple.com/kb/HT214088
- https://www.debian.org/security/2023/dsa-5489Third Party Advisory
- http://seclists.org/fulldisclosure/2024/Mar/21
- http://seclists.org/fulldisclosure/2024/Mar/24
- http://seclists.org/fulldisclosure/2024/Mar/25
- https://bugs.astron.com/view.php?id=310ExploitVendor Advisory
- https://security.netapp.com/advisory/ntap-20231116-0002/Third Party Advisory
FAQ
What is CVE-2022-48554?
CVE-2022-48554 is a vulnerability with a CVSS score of 5.5 (MEDIUM). File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
How severe is CVE-2022-48554?
CVE-2022-48554 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-48554?
Check the references section above for vendor advisories and patch information. Affected products include: File Project File, Debian Debian Linux.