CVE-2018-19655
Advisory lineage Upstream: 0 Downstream: 6
Modified
Published: 29 Nov 2018, 05:00
Last modified:05 Aug 2024, 11:44
Vulnerability Summary
Overall Risk (default)
medium
45/100 CVSS Score
8.8 HIGH
v3.0 (nvd)
EPSS Score
0.69% LOW
1% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
2 found
Dark Web
Not detected
Timeline
29 Nov 2018, 05:00
Published
Vulnerability first disclosed
05 Aug 2024, 11:44
Last Modified
Vulnerability information updated
Description
A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.
CVSS Metrics
- v3.0•HIGH•Score: 8.8CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- v2.0•MEDIUM•Score: 6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 0.69%• Percentile: 72%
Techniques & Countermeasures
- CWE-787•Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Affected Systems
- dcraw_project•dcraw
≤ 9.28
- suse•suse_linux_enterprise_desktop
12:sp3 | 12:sp4
- suse•suse linux enterprise server
11:sp4 | 12:sp3 | 12:sp4
References (5)
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906529
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890086
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RD65NMWZ5OQNUIF7CLGKLDG4LVPPMJY7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XK4SHVVIZT6FHJVHOQSAFJMQWDLMWKDE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3JX4A5F4DWP6NOEULXQXZ5AIH4GA62U/