CVE-2018-10767

Impact:
Low
Public Date:
2018-05-05
CWE:
CWE-121
Bugzilla:
1576175: CVE-2018-10767 libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c

The MITRE CVE dictionary describes this issue as:

There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.

Find out more about CVE-2018-10767 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 3.3
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Attack Vector Local
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (libgxps) RHSA-2018:3140 2018-10-30

Acknowledgements

Red Hat would like to thank chenyuan (NESA Lab) for reporting this issue.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.