Vigil@nce - PSPP: buffer overflow via read_string(), analyzed on 15/09/2022
November 2022 by Vigil@nce
An attacker can trigger a buffer overflow of PSPP, via read_string(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/PSPP-buffer-overflow-via-read-string-39287