### [CVE-2016-10722](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10722) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description partclone.fat in Partclone before 0.2.88 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the FAT superblock, related to the mark_reserved_sectors function. An attacker may be able to execute arbitrary code in the context of the user running the affected application. ### POC #### Reference - https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/ - https://david.gnedt.at/blog/2016/11/14/advisory-partclone-fat-bitmap-heap-overflow/ - https://github.com/Thomas-Tsai/partclone/issues/71 - https://github.com/Thomas-Tsai/partclone/issues/71 #### Github No PoCs found on GitHub currently.