There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHBA-2019:0327 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3140 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3505 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1575188 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-05-06T23:00:00
Updated: 2019-04-24T05:06:07
Reserved: 2018-05-06T00:00:00
Link: CVE-2018-10767
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-05-06T23:29:00.237
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-10767
JSON object: View
Redhat Information
No data.
CWE