Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qvx2-59g8-8hph

Опубликовано: 25 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

docconv vulnerable to Memory Allocation with Excessive Size Value

A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 can address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779.

Пакеты

Наименование

github.com/sajari/docconv

go
Затронутые версииВерсия исправления

< 1.2.1

1.2.1

Наименование

code.sajari.com/docconv

go
Затронутые версииВерсия исправления

< 1.2.1

1.2.1

EPSS

Процентиль: 63%
0.00445
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-789

Связанные уязвимости

CVSS3: 4.3
nvd
около 3 лет назад

A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779.

EPSS

Процентиль: 63%
0.00445
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-789