Описание
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1.14.52-1ubuntu0.1 |
esm-apps/bionic | needs-triage | |
esm-apps/xenial | needs-triage | |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/focal | not-affected | 1.14.46-1ubuntu0.1 |
focal | released | 1.14.46-1ubuntu0.1 |
jammy | released | 1.14.47-1ubuntu0.1 |
noble | released | 1.14.51-2ubuntu0.1 |
oracular | released | 1.14.52-1ubuntu0.1 |
plucky | released | 1.14.52-1ubuntu0.1 |
Показывать по
EPSS
8.4 High
CVSS3
Связанные уязвимости
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
An integer overflow vulnerability exists in the Compound Document Bina ...
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Уязвимость библиотеки структурированных файлов GNOME Project G libgsf, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
EPSS
8.4 High
CVSS3