CVE-2015-0838Improper Restriction of Operations within the Bounds of a Memory Buffer in Project Dulwich

Severity
7.5HIGHNVD
EPSS
2.8%
top 13.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateMay 17

Description

Buffer overflow in the C implementation of the apply_delta function in _pack.c in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

Debiandulwich_project/dulwich< 0.10.1-1+3

Also affects: Debian Linux 7.0

🔴Vulnerability Details

4
GHSA
Dulwich Buffer Overflow when handling pack files2022-05-17
OSV
Dulwich Buffer Overflow when handling pack files2022-05-17
CVEList
CVE-2015-0838: Buffer overflow in the C implementation of the apply_delta function in _pack2015-03-31
OSV
CVE-2015-0838: Buffer overflow in the C implementation of the apply_delta function in _pack2015-03-31

📋Vendor Advisories

1
Debian
CVE-2015-0838: dulwich - Buffer overflow in the C implementation of the apply_delta function in _pack.c i...2015

💬Community

3
Bugzilla
CVE-2015-0838 python-dulwich: buffer overflow in apply_delta() [epel-all]2015-04-23
Bugzilla
CVE-2015-0838 python-dulwich: buffer overflow in apply_delta() [fedora-all]2015-04-23
Bugzilla
CVE-2015-0838 python-dulwich: buffer overflow in apply_delta()2015-03-17
CVE-2015-0838 — Dulwich Project Dulwich vulnerability | cvebase