First published: Mon Aug 20 2018(Updated: )
pkgconf version 1.5.0 to 1.5.2 contains a Buffer Overflow vulnerability in dequote() that can result in dequote() function returns 1-byte allocation if initial length is 0, leading to buffer overflow. This attack appear to be exploitable via specially crafted .pc file. This vulnerability appears to have been fixed in 1.5.3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Pkgconf | >=1.5.0<=1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000221 has a medium severity rating due to its potential to cause a buffer overflow.
To fix CVE-2018-1000221, upgrade pkgconf to version 1.5.3 or later.
CVE-2018-1000221 affects pkgconf versions from 1.5.0 to 1.5.2 inclusive.
Exploiting CVE-2018-1000221 could lead to a buffer overflow, potentially resulting in arbitrary code execution.
CVE-2018-1000221 can be exploited via specially crafted .pc files, which may be delivered remotely.