7.5
CVSSv3

CVE-2018-12648

Published: 22/06/2018 Updated: 27/06/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The WEBP::GetLE32 function in XMPFiles/source/FormatSupport/WEBP_Support.hpp in Exempi 2.4.5 has a NULL pointer dereference.

Vulnerable Product Search on Vulmon Subscribe to Product

exempi project exempi 2.4.5

Vendor Advisories

Debian Bug report logs - #902175 CVE-2018-12648 Package: src:exempi; Maintainer for src:exempi is Michael Biebl <biebl@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 23 Jun 2018 06:51:01 UTC Severity: important Tags: fixed-upstream, security, upstream Found in version exempi/245-1 Fixed i ...
Exempi is vulnerable to an issue that may manifest as a NULL pointer dereference or an out-of-bounds access due to not checking if vector is of required size before accessing its elements An attacker could use this to cause a denial of service ...