Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts/2018/02/msg00054.html | Mailing List Third Party Advisory |
https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Patch Third Party Advisory |
https://bugs.debian.org/890548 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/03/msg00005.html | Mailing List Third Party Advisory |
Information
Published : 2018-02-16 08:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-7186
Mitre link : CVE-2018-7186
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
leptonica
- leptonica