7.5
CVSSv2

CVE-2018-7186

Published: 16/02/2018 Updated: 18/12/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Leptonica prior to 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote malicious users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.

Vulnerable Product Search on Vulmon Subscribe to Product

leptonica leptonica

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #898439 leptonlib: CVE-2018-7442 Package: src:leptonlib; Maintainer for src:leptonlib is Jeff Breidenbach <jab@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 11 May 2018 17:21:01 UTC Severity: important Tags: security, upstream Found in version leptonlib/1753 ...
Debian Bug report logs - #890548 leptonlib: CVE-2018-7186: Stack buffer overflows Package: src:leptonlib; Maintainer for src:leptonlib is Jeff Breidenbach <jab@debianorg>; Reported by: Ben Hutchings <ben@decadentorguk> Date: Thu, 15 Feb 2018 20:39:02 UTC Severity: serious Tags: patch, security, upstream Found in ...