4.3
CVSSv2

CVE-2016-10713

Published: 13/02/2018 Updated: 18/04/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in GNU patch prior to 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu patch

Vendor Advisories

Synopsis Low: patch security and bug fix update Type/Severity Security Advisory: Low Topic An update for patch is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which giv ...
Several security issues were fixed in Patch ...
Several security issues were fixed in Patch ...
do_ed_script in pchc in GNU patch through 276 does not block strings beginning with a ! character NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter(CVE-2018-20969) GNU patch through 276 is vulnerable to OS shell command injection that can be exploited by opening ...
do_ed_script in pchc in GNU patch through 276 does not block strings beginning with a ! character NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter(CVE-2018-20969) GNU patch through 276 is vulnerable to OS shell command injection that can be exploited by opening ...
A heap-based out-of-bounds read flaw was found in the way the patch utility parsed patch files An attacker could potentially use this flaw to crash the patch utility by tricking it into processing crafted patch files ...
An issue was discovered in GNU patch before 276 An out-of-bounds access within pch_write_line() in pchc can possibly lead to denial of service via a crafted input file ...