Stack-based buffer overflow in the get_key function in parse.c in abcm2ps through 8.13.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
References
Link | Resource |
---|---|
https://github.com/leesavide/abcm2ps/issues/17 | Exploit Third Party Advisory |
https://drive.google.com/open?id=1HE9cht7WJPauA66acyJrEywXX8R4Hg-2 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LSTB65NYYCKU7O6RF5B6CYY5IA6CA66Y/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6DUTXB4EC3TQHTTAAIBKJ54GJTF6Y7V/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGDXW2I3MY3QH4PJXLJET5QZZXMXTNWO/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-05-06 19:29
Updated : 2022-11-28 14:08
NVD link : CVE-2018-10771
Mitre link : CVE-2018-10771
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
moinejf
- abcm2ps
fedoraproject
- fedora