CVE-2018-5800
Advisory lineage Upstream: 0 Downstream: 7
Modified
Published: 07 Dec 2018, 22:00
Last modified:05 Aug 2024, 05:47
Vulnerability Summary
Overall Risk (default)
medium
26/100 CVSS Score
6.5 MEDIUM
v3.1 (nvd)
EPSS Score
1.48% LOW
1% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
07 Dec 2018, 22:00
Published
Vulnerability first disclosed
05 Aug 2024, 05:47
Last Modified
Vulnerability information updated
Description
An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
CVSS Metrics
- v3.1•MEDIUM•Score: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
- v2.0•MEDIUM•Score: 4.3AV:N/AC:M/Au:N/C:N/I:N/A:P
EPSS Trends
Current EPSS score: 1.48%• Percentile: 81%
Techniques & Countermeasures
- CWE-193•Off-by-one Error
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
- CWE-787•Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Affected Systems
- canonical•ubuntu_linux
14.04 | 16.04 | 17.10
- debian•debian_linux
8.0
- libraw•libraw
< 0.18.7
- redhat•enterprise_linux_desktop
7.0
- redhat•enterprise_linux_server
7.0
- redhat•enterprise_linux_workstation
7.0
References (8)
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/
- https://secuniaresearch.flexerasoftware.com/advisories/79000/
- http://www.securityfocus.com/bid/104663
- https://access.redhat.com/errata/RHSA-2018:3065
- https://usn.ubuntu.com/3615-1/
- https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html
- https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4