CVE-2018-5805
Advisory lineage Upstream: 0 Downstream: 8
Modified
Published: 07 Dec 2018, 22:00
Last modified:05 Aug 2024, 05:47
Vulnerability Summary
Overall Risk (default)
medium
35/100 CVSS Score
8.8 HIGH
v3.0 (nvd)
EPSS Score
0.5% LOW
1% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
07 Dec 2018, 22:00
Published
Vulnerability first disclosed
05 Aug 2024, 05:47
Last Modified
Vulnerability information updated
Description
A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.
CVSS Metrics
- v3.0•HIGH•Score: 8.8CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- v2.0•MEDIUM•Score: 6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 0.50%• Percentile: 66%
Techniques & Countermeasures
- CWE-787•Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
Affected Systems
- libraw•libraw
< 0.18.8
- redhat•enterprise_linux_desktop
7.0
- redhat•enterprise_linux_server
7.0
- redhat•enterprise_linux_workstation
7.0
References (5)
- https://secuniaresearch.flexerasoftware.com/advisories/81000/
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://access.redhat.com/errata/RHSA-2018:3065
- https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/