First published: Wed Dec 19 2018(Updated: )
An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU PSPP | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-20230.
The severity of CVE-2018-20230 is high with a CVSS score of 7.8.
CVE-2018-20230 is found in GNU PSPP version 1.2.0.
The vulnerability may cause a denial of service (application crash) or have unspecified other impact.
Yes, upgrading to a version higher than 1.2.0 of GNU PSPP will fix the vulnerability.