Your submission was sent successfully! Close

CVE-2018-3836

Published: 24 April 2018

An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.

From the Ubuntu security team

It was discovered that Leptonica incorrectly handled certain input arguments. An attacker could possibly use this issue to execute arbitrary commands.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
leptonlib
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable
(1.75.3-2)
cosmic Not vulnerable
(1.75.3-2)
disco Not vulnerable
(1.75.3-2)
eoan Not vulnerable
(1.75.3-2)
focal Not vulnerable
(1.75.3-2)
groovy Not vulnerable
(1.75.3-2)
hirsute Not vulnerable
(1.75.3-2)
impish Not vulnerable
(1.75.3-2)
jammy Not vulnerable
(1.75.3-2)
precise Does not exist

trusty Needed

upstream Needs triage

xenial Ignored
(end of standard support, was needed)