4.6
CVSSv2

CVE-2012-0065

Published: 06/10/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 up to and including 1.0.7 allows physically proximate malicious users to execute arbitrary code via a long SerialNumber field in a property list.

Vulnerable Product Search on Vulmon Subscribe to Product

nikias bassen usbmuxd 1.0.6

nikias bassen usbmuxd 1.0.5

nikias bassen usbmuxd 1.0.7

Vendor Advisories

usbmuxd could be made to crash or run programs if it received specially crafted input ...
Debian Bug report logs - #656581 usbmuxd: buffer overflow introduced in 107 (CVE-2012-0065) Package: usbmuxd; Maintainer for usbmuxd is gtkpod Maintainers <pkg-gtkpod-devel@alioth-listsdebiannet>; Source for usbmuxd is src:usbmuxd (PTS, buildd, popcon) Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Fri, ...