Remote Code Execution Vulnerability in Git by Version 2.7.4
CVE-2016-2315

9.8CRITICAL

Key Information:

Summary

This vulnerability in Git occurs due to an improper integer data type management within the revision component. Attackers can leverage this flaw by providing a long filename or utilizing deeply nested trees, which leads to a heap-based buffer overflow. Successful exploitation could allow remote attackers to execute arbitrary code, potentially compromising the system's integrity.

References

EPSS Score

11% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.