Memory Read Vulnerability in Git Products by Git
CVE-2018-11233
7.5HIGH
Summary
In various versions of Git prior to specific updates, a vulnerability exists that can be exploited during pathname sanity-checking on NTFS file systems. This flaw allows for reading out-of-bounds memory, potentially leading to the exposure of sensitive information or other security impacts. Users are strongly advised to upgrade to the latest versions to mitigate any risks associated with this vulnerability.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved