First published: Sun May 06 2018(Updated: )
There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libgxps | <=0.3.0 | |
Red Hat Ansible Tower | =3.3 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10767 has been classified as a denial of service vulnerability.
To fix CVE-2018-10767, update libgxps to version 0.3.1 or later.
CVE-2018-10767 is caused by a stack-based buffer over-read due to negative return values from a g_input_stream_read call.
CVE-2018-10767 affects versions of libgxps up to 0.3.0, among other software related to Red Hat products.
Yes, CVE-2018-10767 can lead to a remote denial of service attack.