First published: Tue Apr 24 2018(Updated: )
An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Leptonica | =1.74.4 | |
Debian GNU/Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3836 has a high severity rating due to the potential for arbitrary code execution.
To fix CVE-2018-3836, update Leptonica to versions later than 1.74.4 that address the command injection vulnerability.
The affected software includes Leptonica version 1.74.4 and Debian GNU/Linux version 7.0.
Yes, CVE-2018-3836 can be exploited remotely if an attacker can control the input passed to the gplotMakeOutput function.
CVE-2018-3836 is a command injection vulnerability that allows attackers to execute arbitrary commands on the system.