Description
In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1610-1 | sleuthkit security update |
Debian DLA |
DLA-3054-1 | sleuthkit security update |
EUVD |
EUVD-2018-11186 | In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c). |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:37:11.462Z
Reserved: 2018-11-23T00:00:00.000Z
Link: CVE-2018-19497
No data.
Status : Modified
Published: 2018-11-29T23:29:00.250
Modified: 2024-11-21T03:58:01.837
Link: CVE-2018-19497
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD