CVE-2018-19497

MEDIUM

The Sleuth Kit <4.6.4 - DoS

Title source: llm
STIX 2.1

Description

In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).

References (6)

Core 6
Core References
Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/12/msg00008.html
Patch, Third Party Advisory x_refsource_misc
https://github.com/sleuthkit/sleuthkit/pull/1374
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html

Scores

CVSS v3 6.5
EPSS 0.0321
EPSS Percentile 87.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (5)
debian/debian_linux 8.0
debian/debian_linux 9.0
fedoraproject/fedora 29
fedoraproject/fedora 30
sleuthkit/the_sleuth_kit < 4.6.4
Published Nov 29, 2018
Tracked Since Feb 18, 2026