Stack-based buffer overflow in abcm2ps - CVE-2018-10771
Published: May 25, 2020
abcm2ps
Lee S.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the get_key function() in parse.c in abcm2ps. A remote attacker can create a specially crafted file, trick the victim into opening it with the affected version of application, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://drive.google.com/open?id=1HE9cht7WJPauA66acyJrEywXX8R4Hg-2
- https://github.com/leesavide/abcm2ps/issues/17
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGDXW2I3MY3QH4PJXLJET5QZZXMXTNWO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSTB65NYYCKU7O6RF5B6CYY5IA6CA66Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6DUTXB4EC3TQHTTAAIBKJ54GJTF6Y7V/