6.5
CVSSv3

CVE-2018-10767

Published: 06/05/2018 Updated: 03/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps up to and including 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome libgxps

redhat ansible tower 3.3

redhat enterprise linux desktop 7.0

redhat enterprise linux server 7.0

redhat enterprise linux workstation 7.0

Vendor Advisories

Debian Bug report logs - #898133 libgxps: CVE-2018-10767: Stack Buffer Overflow in calling glib in gxps_images_guess_content_type of gcontenttypec Package: src:libgxps; Maintainer for src:libgxps is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debiano ...
Synopsis Moderate: GNOME security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Critical: Red Hat Ansible Tower 331-2 Release - Container Image Type/Severity Security Advisory: Critical Topic Security Advisory Description Red Hat Ansible Tower 331 is now available and contains the following bug fixes: Fixed event callback error when in-line vaulted variabl ...
There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-imagesc in libgxps through 030 because it does not reject negative return values from a g_input_stream_read call A crafted input will lead to a remote denial of service attack ...