First published: Mon May 07 2018(Updated: )
Stack-based buffer overflow in the get_key function in parse.c in abcm2ps through 8.13.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
abcm2ps | <=8.13.20 | |
Debian Linux | =9.0 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10771 has been classified as a high severity vulnerability that can lead to application crashes and potential denial of service.
To fix CVE-2018-10771, upgrade abcm2ps to version 8.13.21 or later that addresses the stack-based buffer overflow.
Vulnerable systems include abcm2ps versions up to 8.13.20, and certain Debian and Fedora distributions that use this software.
Exploiting CVE-2018-10771 could allow remote attackers to crash the application, leading to service disruption.
As a workaround for CVE-2018-10771, consider restricting access to the affected software or discontinuing its use until it can be updated.