First published: Tue Sep 04 2018(Updated: )
GNU Libextractor through 1.7 has an out-of-bounds read vulnerability in EXTRACTOR_zip_extract_method() in zip_extractor.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libextractor | <=1:1.3-1<=1:1.3-4<=1:1.6-2 | 1:1.7-1 1:1.3-4+deb9u2 |
debian/libextractor | 1:1.8-2+deb10u1 1:1.11-2 1:1.11-7 1:1.11-8 | |
libextractor | <=1.7 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16430 has a medium severity rating due to the potential for out-of-bounds read vulnerabilities that could be exploited.
To fix CVE-2018-16430, upgrade your version of libextractor to 1.8-2+deb10u1 or higher.
Versions of libextractor up to and including 1.7 are affected by CVE-2018-16430.
CVE-2018-16430 is considered a local vulnerability, as it requires access to the affected software's functionality.
Yes, CVE-2018-16430 can be exploited on Debian Linux systems running affected versions of libextractor.