Buffer overflow in Leptonica - CVE-2018-7247
Published: March 20, 2018 / Updated: March 21, 2018
Vulnerability identifier: #VU11176
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-7247
CWE-ID: CWE-120
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: DanBloomberg
Affected software:
Leptonica
Leptonica
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.
The weakness exists in the pixHtmlViewer function due to buffer overflow. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the pixHtmlViewer function due to buffer overflow. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2018-7247
Update to version 1.75.3.