{ "schema_version": "1.4.0", "id": "GHSA-vvvg-pm5p-r68f", "modified": "2022-05-17T02:36:10Z", "published": "2022-05-17T02:36:10Z", "aliases": [ "CVE-2017-9763" ], "details": "The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9763" }, { "type": "WEB", "url": "https://github.com/radare/radare2/issues/7723" }, { "type": "WEB", "url": "https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd" }, { "type": "WEB", "url": "http://git.savannah.gnu.org/cgit/grub.git/commit/grub-core/fs/ext2.c?id=ac8cac1dac50daaf1c390d701cca3b55e16ee768" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99141" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-06-19T16:29:00Z" } }