Use-After-Free Vulnerability in GNU cflow Affects Multiple Versions
CVE-2019-16165
6.5MEDIUM
Summary
GNU cflow versions up to 1.6 are susceptible to a use-after-free vulnerability located in the reference function within parser.c. This flaw can potentially be exploited by attackers to execute arbitrary code or cause unexpected behavior in the software, highlighting the importance of timely updates and patches to safeguard against potential threats. Users should prioritize upgrading to the latest version to mitigate this risk.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved