CVE-2018-14550
Severity
8.8HIGH
EPSS
1.8%
top 17.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 10
Latest updateMar 22
Description
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
2💬Community
8Bugzilla▶
CVE-2018-14550 libpng10: libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution [epel-6]↗2018-07-26
Bugzilla▶
CVE-2018-14550 libpng15: libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution [fedora-all]↗2018-07-26
Bugzilla▶
CVE-2018-14550 libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution↗2018-07-26
Bugzilla▶
CVE-2018-14550 libpng12: libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution [fedora-all]↗2018-07-26
Bugzilla▶
CVE-2018-14550 mingw-libpng: libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution [epel-7]↗2018-07-26