CVE-2018-20431
Published: 24 December 2018
GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c.
From the Ubuntu security team
It was discovered that Libextractor incorrectly handled metadata. An attacker could possibly use this issue to cause a denial of service.
Priority
CVSS 3 base score: 6.5
Status
Package | Release | Status |
---|---|---|
libextractor Launchpad, Ubuntu, Debian |
Upstream |
Released
(1:1.3-2+deb8u4, 1:1.8-2)
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1:1.9-2)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(1:1.9-2)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(1:1.9-2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needed
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:1.3-4+deb9u3build0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needed)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431
- https://gnunet.org/bugs/view.php?id=5494
- https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7
- https://gnunet.org/git/libextractor.git/tree/ChangeLog
- https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
- https://usn.ubuntu.com/usn/usn-4641-1
- NVD
- Launchpad
- Debian