First published: Sat May 05 2018(Updated: )
Stack-based buffer overflow in the delayed_output function in music.c in abcm2ps through 8.13.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
moinejf abcm2ps | <=8.13.20 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10753 is rated as critical with a CVSS score of 9.8.
To mitigate the vulnerability in CVE-2018-10753, consider updating to a version of abcm2ps that is not affected by the stack-based buffer overflow.
Yes, updating abcm2ps to a version beyond 8.13.20 can help fix the stack-based buffer overflow vulnerability in CVE-2018-10753.
The Common Weakness Enumeration (CWE) associated with CVE-2018-10753 includes CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-787 (Out-of-bounds Write).