cve/2016/CVE-2016-10722.md

19 lines
866 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-10722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10722)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application.
### POC
#### Reference
- https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/
- https://github.com/Thomas-Tsai/partclone/issues/71
#### Github
No PoCs found on GitHub currently.