Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5809

Опубликовано: 30 мая 2018
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

Отчет

This issue did not affect the versions of LibRaw as shipped with Red Hat Enterprise Linux 7 as the vulnerable code is not present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7LibRawNot affected
Red Hat Enterprise Linux 8LibRawNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1661520LibRaw: stack-based buffer overflow in LibRaw::parse_exif() and subsequently execute arbitrary code

EPSS

Процентиль: 83%
0.01917
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

CVSS3: 8.8
nvd
около 7 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

CVSS3: 8.8
debian
около 7 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_co ...

CVSS3: 8.8
github
больше 3 лет назад

An error within the "LibRaw::parse_exif()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a stack-based buffer overflow and subsequently execute arbitrary code.

EPSS

Процентиль: 83%
0.01917
Низкий

7.8 High

CVSS3