CVE-2018-3836

Published: 24 April 2018

An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.

From the Ubuntu security team

It was discovered that Leptonica incorrectly handled certain input arguments. An attacker could possibly use this issue to execute arbitrary commands.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
leptonlib
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.75.3-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.75.3-2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.75.3-2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Needed