{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T05:45:09.552","vulnerabilities":[{"cve":{"id":"CVE-2017-1082","sourceIdentifier":"secteam@freebsd.org","published":"2018-09-12T14:29:00.250","lastModified":"2024-11-21T03:21:18.127","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In FreeBSD 11.x before 11.1-RELEASE and 10.x before 10.4-RELEASE, the qsort algorithm has a deterministic recursion pattern. Feeding a pathological input to the algorithm can lead to excessive stack usage and potential overflow. Applications that use qsort to handle large data set may crash if the input follows the pathological pattern."},{"lang":"es","value":"En FreeBSD en versiones 11.x anteriores a la 11.1-RELEASE y versiones 10.x anteriores a la 10.4-RELEASE, el algoritmo qsort tiene un patrón determinístico de recursión. Si se proporciona una entrada patológica al algoritmo, se puede producir un uso excesivo de la pila y un potencial desbordamiento. Las aplicaciones que emplean qsort para gestionar grandes grupos de datos podrían cerrarse inesperadamente si la entrada sigue el patrón patológico."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0","versionEndIncluding":"10.4","matchCriteriaId":"89978DF5-365D-47EB-BD67-7CC84D4F0222"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.1","matchCriteriaId":"702C5136-33B6-4F0F-8FF7-C2BE3668DE70"}]}]}],"references":[{"url":"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt","source":"secteam@freebsd.org","tags":["Exploit","Technical Description","Third Party Advisory"]},{"url":"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory"]}]}}]}