CVE-2018-10771Out-of-bounds Write in Abcm2ps

Severity
9.8CRITICALNVD
EPSS
1.9%
top 16.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateMar 16

Description

Stack-based buffer overflow in the get_key function in parse.c in abcm2ps through 8.13.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/abcm2ps< abcm2ps 8.14.2-0.1 (bookworm)
Debianabcm2ps_project/abcm2ps< 8.14.2-0.1+3
Ubuntuabcm2ps_project/abcm2ps< 7.8.9-1+deb9u1build0.18.04.1+3
NVDmoinejf/abcm2ps8.13.20

Also affects: Debian Linux 9.0, Fedora 30, 31, 32

🔴Vulnerability Details

3
OSV
abcm2ps vulnerabilities2023-03-16
GHSA
GHSA-4v6g-m96g-x25q: Stack-based buffer overflow in the get_key function in parse2022-05-13
OSV
CVE-2018-10771: Stack-based buffer overflow in the get_key function in parse2018-05-07

📋Vendor Advisories

2
Ubuntu
abcm2ps vulnerabilities2023-03-16
Debian
CVE-2018-10771: abcm2ps - Stack-based buffer overflow in the get_key function in parse.c in abcm2ps throug...2018

💬Community

2
Bugzilla
CVE-2018-10771 abcm2ps: Stack-based buffer overflow in parse.c:get_key() allows for denial of service [fedora-all]2018-05-10
Bugzilla
CVE-2018-10771 abcm2ps: Stack-based buffer overflow in parse.c:get_key() allows for denial of service2018-05-10