uuq has been reported prone to a buffer overflow condition that is reported to present itself when an argument of excessive size is passed to the affected binary. The issue is likely due to a lack of sufficient bounds checking performed on user supplied '-r' parameters before the data is copied into an insufficient reserved buffer in memory. A local attacker may exploit this condition to corrupt memory that is adjacent to the affected buffer.
uuq has been reported prone to a buffer overflow condition that is reported to present itself when an argument of excessive size is passed to the affected binary. The issue is likely due to a lack of sufficient bounds checking performed on user supplied '-r' parameters before the data is copied into an insufficient reserved buffer in memory. A local attacker may exploit this condition to corrupt memory that is adjacent to the affected buffer.