4.6
CVSSv2

CVE-2012-0065

Published: 06/10/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 up to and including 1.0.7 allows physically proximate malicious users to execute arbitrary code via a long SerialNumber field in a property list.

Vulnerable Product Search on Vulmon Subscribe to Product

nikias bassen usbmuxd 1.0.6

nikias bassen usbmuxd 1.0.5

nikias bassen usbmuxd 1.0.7

Vendor Advisories

Debian Bug report logs - #656581 usbmuxd: buffer overflow introduced in 107 (CVE-2012-0065) Package: usbmuxd; Maintainer for usbmuxd is gtkpod Maintainers <pkg-gtkpod-devel@alioth-listsdebiannet>; Source for usbmuxd is src:usbmuxd (PTS, buildd, popcon) Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Fri, ...
usbmuxd could be made to crash or run programs if it received specially crafted input ...