Buffer Overflow Vulnerability in perM by Debian
CVE-2021-38172
9.8CRITICAL
Summary
The perM version 0.4.0 contains a buffer overflow vulnerability linked to the improper use of the strncpy function. This flaw can be exploited to potentially modify memory and cause unpredictable behavior in the application. A fix has been implemented in Debian, starting from version 0.4.0-7. Users of perM are advised to upgrade to the latest version to mitigate any security risks associated with this vulnerability.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved