New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2016-10722: FAT Bitmap Heap Overflow #71

lxp opened this Issue Jan 5, 2016 · 2 comments


None yet
1 participant

lxp commented Jan 5, 2016

 title    : Partclone FAT Bitmap Heap Overflow
 product  : Partclone
 version  : 0.2.87
 homepage :
 found    : 2016-01-03
 by       : David Gnedt

Vendor description:

Partclone is a parition imaging tool supporting the FAT filesystem.
Partclone is shipped by various Linux distributions and used by
specialized disk cloning systems like DRBL (,
Clonezilla (, Redo Backup
(, ...

Vulnerability overview/description:

partclone.fat is prone to a heap-based buffer overflow vulnerability
due to insufficient validation of the FAT superblock. An attacker may
be able to execute arbitrary code in the context of the user running
the affected application.

<details stripped until public fix is available>

Proof of concept:

<details stripped until public fix is available>

Vulnerable/tested versions:

The vulnerability is verified to exist in 0.2.87 of Partclone, which is
the most recent version at the time of discovery.
Older versions are probably affected as well.

This comment has been minimized.

lxp commented Nov 14, 2016

The issue is fixed since 0.2.88. I have tested 0.2.88 and 0.2.89.
You can find the full version of the advisory on my blog:


This comment has been minimized.

lxp commented May 2, 2018

CVE-2016-10722 was assigned to this issue.

@lxp lxp changed the title from FAT Bitmap Heap Overflow to CVE-2016-10722: FAT Bitmap Heap Overflow May 2, 2018

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment