CVE-2018-10767Out-of-bounds Read in Libgxps

Severity
6.5MEDIUMNVD
EPSS
0.9%
top 25.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateMay 13

Description

There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages6 packages

🔴Vulnerability Details

3
GHSA
GHSA-fg6g-g2cv-hgpf: There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images2022-05-13
OSV
CVE-2018-10767: There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images2018-05-06
CVEList
CVE-2018-10767: There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images2018-05-06

📋Vendor Advisories

2
Red Hat
libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c2018-05-05
Debian
CVE-2018-10767: libgxps - There is a stack-based buffer over-read in calling GLib in the function gxps_ima...2018

💬Community

2
Bugzilla
CVE-2018-10767 libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c2018-05-09
Bugzilla
CVE-2018-10767 libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c [fedora-all]2018-05-09
CVE-2018-10767 — Out-of-bounds Read in Gnome Libgxps | cvebase