Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5809

Опубликовано: 07 дек. 2018
Источник: debian

Описание

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
librawfixed0.18.11-1package
librawnot-affectedstretchpackage
librawnot-affectedjessiepackage

Примечания

  • https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/

  • https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

CVSS3: 7.8
redhat
больше 7 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

CVSS3: 8.8
nvd
около 7 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

CVSS3: 8.8
github
больше 3 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.