Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:37:48.560Z
Reserved: 2011-09-21T00:00:00
Link: CVE-2011-3631

No data.

Status : Modified
Published: 2019-11-26T04:15:11.013
Modified: 2024-11-21T01:30:53.213
Link: CVE-2011-3631
