ID CVE-2018-7186
Summary Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
References
Vulnerable Configurations
  • cpe:2.3:a:leptonica:leptonica:1.42:*:*:*:*:*:*:*
    cpe:2.3:a:leptonica:leptonica:1.42:*:*:*:*:*:*:*
  • cpe:2.3:a:leptonica:leptonica:1.44:*:*:*:*:*:*:*
    cpe:2.3:a:leptonica:leptonica:1.44:*:*:*:*:*:*:*
  • cpe:2.3:a:leptonica:leptonica:1.68:*:*:*:*:*:*:*
    cpe:2.3:a:leptonica:leptonica:1.68:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-12-2023 - 08:15)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
misc
mlist [debian-lts-announce] 20180307 [SECURITY] [DLA 1302-1] leptonlib security update
Last major update 18-12-2023 - 08:15
Published 16-02-2018 - 16:29
Last modified 18-12-2023 - 08:15
Back to Top