Description
Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1302-1 | leptonlib security update |
Ubuntu USN |
USN-4819-1 | Leptonica vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T06:24:11.501Z
Reserved: 2018-02-16T00:00:00.000Z
Link: CVE-2018-7186
No data.
Status : Modified
Published: 2018-02-16T16:29:00.160
Modified: 2024-11-21T04:11:45.120
Link: CVE-2018-7186
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN