Denial of service in libgxps

Published: 2018-05-16 12:21:28
Severity Low
Patch available NO
Number of vulnerabilities 1
CVE ID CVE-2018-10767
CVSSv3 4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:U]
CWE ID CWE-126
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software libgxps
Vulnerable software versions libgxps 0.1
libgxps 0.2
libgxps 0.2.1
Show more
Vendor URL Gnome Development Team

Security Advisory

1) Stack-based buffer over-read

Description

The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the gxps_images_guess_content_type function due to improper rejection of negative return values from a g_input_stream_read call. A remote attacker can submit a specially crafted request, trigger stack-based buffer overread when calling GLib in the gxps_images_guess_content_typefunction, as defined in the gxps-images.c source code file, and cause the service to crash.

Remediation

Cybersecurity is currently unaware of any solutions addressing the vulnerability.

External links

https://bugzilla.redhat.com/show_bug.cgi?id=1575188

Back to List