CVE-2018-7728Out-of-bounds Read in Project Exempi

CWE-125Out-of-bounds Read10 documents9 sources
Severity
5.5MEDIUMNVD
EPSS
0.5%
top 36.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 6
Latest updateMay 13

Description

An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FileHandlers/TIFF_Handler.cpp mishandles a case of a zero length, leading to a heap-based buffer over-read in the MD5Update() function in third-party/zuid/interfaces/MD5.cpp.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianexempi_project/exempi< 2.4.5-1+3

Also affects: Debian Linux 7.0, Ubuntu Linux 14.04, 16.04, 17.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mvg5-qjm5-hg7r: An issue was discovered in Exempi through 22022-05-13
OSV
CVE-2018-7728: An issue was discovered in Exempi through 22018-03-06
CVEList
CVE-2018-7728: An issue was discovered in Exempi through 22018-03-06

💥Exploits & PoCs

1
Exploit-DB
CAMALEON CMS 2.4 - Cross-Site Scripting2018-10-12

📋Vendor Advisories

3
Ubuntu
Exempi vulnerabilities2018-06-04
Red Hat
exempi: Heap-based buffer overflow in third-party/zuid/interfaces/MD5.cpp:MD5Update() allows for denial of service via crafted TIFF image2018-02-22
Debian
CVE-2018-7728: exempi - An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FileHandlers/TI...2018

💬Community

2
Bugzilla
CVE-2018-7728 CVE-2018-7729 CVE-2018-7730 CVE-2018-7731 exempi: various flaws [fedora-all]2018-03-14
Bugzilla
CVE-2018-7728 exempi: Heap-based buffer overflow in third-party/zuid/interfaces/MD5.cpp:MD5Update() allows for denial of service via crafted TIFF image2018-03-14
CVE-2018-7728 — Out-of-bounds Read in Project Exempi | cvebase