Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
References
Link | Resource |
---|---|
https://bugs.debian.org/890548 | Third Party Advisory |
https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/03/msg00005.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts/2018/02/msg00054.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202312-01 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-16T00:00:00
Updated: 2023-12-18T08:06:22.617260
Reserved: 2018-02-16T00:00:00
Link: CVE-2018-7186
JSON object: View
NVD Information
Status : Modified
Published: 2018-02-16T16:29:00.160
Modified: 2023-12-18T08:15:06.603
Link: CVE-2018-7186
JSON object: View
Redhat Information
No data.
CWE