9.8
CVSSv3

CVE-2020-13995

Published: 25/09/2020 Updated: 03/05/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

U.S. Air Force Sensor Data Management System extract75 has a buffer overflow that leads to code execution. An overflow in a global variable (sBuffer) leads to a Write-What-Where outcome. Writing beyond sBuffer will clobber most global variables until reaching a pointer such as DES_info or image_info. By controlling that pointer, one achieves an arbitrary write when its fields are assigned. The data written is from a potentially untrusted NITF file in the form of an integer. The attacker can gain control of the instruction pointer.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

airforce nitf extract utility 7.5

Github Repositories

Control Flow Hijack Exploit for CVE-2020-13995 Build it: make Run it: make run Mayhem it: docker tag extract75-cve-2020-13955 <your name>/extract75-cve-2020-13955 docker push <your name>/extract75-cve-2020-13955 mayhem run --image <your name>/extract75-cve-2