Your submission was sent successfully! Close

CVE-2018-7186

Published: 16 February 2018

Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.

From the Ubuntu security team

It was discovered that Leptonica incorrectly handled input arguments. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
leptonlib
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable
(1.75.3-2)
cosmic Not vulnerable
(1.75.3-2)
disco Not vulnerable
(1.75.3-2)
eoan Not vulnerable
(1.75.3-2)
focal Not vulnerable
(1.75.3-2)
groovy Not vulnerable
(1.75.3-2)
hirsute Not vulnerable
(1.75.3-2)
impish Not vulnerable
(1.75.3-2)
jammy Not vulnerable
(1.75.3-2)
precise Does not exist

trusty Needed

upstream Needs triage

xenial Ignored
(end of standard support, was needed)