First published: Fri Feb 23 2018(Updated: )
Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Leptonica | <=1.75.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7441 is classified as a medium severity vulnerability due to the potential for local file overwrite and race condition exploitation.
To mitigate CVE-2018-7441, update Leptonica to version 1.75.4 or later, where the hardcoded /tmp pathnames issue is resolved.
CVE-2018-7441 may allow local users to overwrite arbitrary files or exploit race conditions, resulting in possible application data corruption or local privilege escalation.
CVE-2018-7441 affects all versions of Leptonica up to and including 1.75.3 that utilize hardcoded /tmp pathnames.
CVE-2018-7441 is not exploitable remotely as it requires local user access to the system to exploit the vulnerability.