Описание
Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fgetc/fputc function calls.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 7 | ttembed | Will not fix |
Показывать по
10
Дополнительная информация
Статус:
Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1610539ttembed: failure to check file bounds may lead to input file corruption
4.3 Medium
CVSS3
Связанные уязвимости
CVSS3: 4.3
nvd
больше 7 лет назад
Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fgetc/fputc function calls.
CVSS3: 7.5
github
больше 3 лет назад
Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fgetc/fputc function calls.
4.3 Medium
CVSS3