Description
The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-474-1 | dosfstools security update |
Debian DLA |
DLA-2224-1 | dosfstools security update |
EUVD |
EUVD-2016-5787 | The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function. |
Ubuntu USN |
USN-2986-1 | dosfstools vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T00:39:26.300Z
Reserved: 2016-05-14T00:00:00.000Z
Link: CVE-2016-4804
No data.
Status : Modified
Published: 2016-06-03T14:59:06.263
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-4804
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN