First published: Mon Apr 16 2018(Updated: )
In the ffgphd and ffgtkn functions in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
NASA CFITSIO | =3.42 | |
Fedoraproject Fedora | =28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2018-3846.
The severity of CVE-2018-3846 is high with a CVSS score of 8.8.
NASA CFITSIO version 3.42 and Fedoraproject Fedora version 28 are affected by CVE-2018-3846.
An attacker can potentially gain code execution through CVE-2018-3846.
Yes, you can find more information about CVE-2018-3846 in the following references: 1. [Fedoraproject Fedora Security Announcement](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K46I2MFPCEOGC5LLDXZSWPB3EBPON3KA/) 2. [Gentoo Linux Security Advisory](https://security.gentoo.org/glsa/202101-24) 3. [Cisco Talos Vulnerability Report](https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0529)