CVE-2018-7186

Published: 16 February 2018

Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.

From the Ubuntu security team

It was discovered that Leptonica incorrectly handled input arguments. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
leptonlib
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.75.3-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.75.3-2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.75.3-2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Needed