First published: Thu Mar 08 2018(Updated: )
There is a heap-based buffer overflow in the getString function of util/decompile.c in libming 0.4.8 for DOUBLE data. A Crafted input will lead to a denial of service attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libming Libming | =0.4.8 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-7877 is medium with a CVSS score of 6.5.
The affected software of CVE-2018-7877 is Libming version 0.4.8 and Debian Linux version 7.0.
The vulnerability type of CVE-2018-7877 is a heap-based buffer overflow.
CVE-2018-7877 can be exploited by providing a crafted input to the getString function of util/decompile.c in libming 0.4.8 for DOUBLE data.
There are no known fixes for CVE-2018-7877 at this time.