Remote Code Execution Vulnerability in Git by Version 2.7.4
CVE-2016-2315
9.8CRITICAL
Key Information:
- Vendor
- Suse
- Status
- Vendor
- CVE Published:
- 8 April 2016
Summary
This vulnerability in Git occurs due to an improper integer data type management within the revision component. Attackers can leverage this flaw by providing a long filename or utilizing deeply nested trees, which leads to a heap-based buffer overflow. Successful exploitation could allow remote attackers to execute arbitrary code, potentially compromising the system's integrity.
References
EPSS Score
11% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved