Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20337

Опубликовано: 21 дек. 2018
Источник: debian
EPSS Низкий

Описание

There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
librawfixed0.19.2-1package
librawnot-affectedstretchpackage
librawnot-affectedjessiepackage

Примечания

  • https://github.com/LibRaw/LibRaw/issues/192

EPSS

Процентиль: 58%
0.0036
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.

CVSS3: 3.3
redhat
больше 6 лет назад

There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.

CVSS3: 8.8
nvd
больше 6 лет назад

There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.

CVSS3: 8.8
github
около 3 лет назад

There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact.

CVSS3: 8.8
fstec
около 6 лет назад

Уязвимость функции parse_makernote библиотеки для обработки изображений LibRaw, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 58%
0.0036
Низкий