First published: Sun Mar 18 2018(Updated: )
** DISPUTED ** The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libevt | 20181227-1 20200926-1 | |
libexpat | <20180317 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8754 has been disputed by the vendor, but it is associated with out-of-bounds access vulnerabilities that may lead to potential security issues.
To fix CVE-2018-8754, upgrade to a version of libevt released after March 17, 2018.
CVE-2018-8754 affects versions of libevt before 2018-03-17 and may specifically impact Debian 9.0 systems.
CVE-2018-8754 can potentially lead to security vulnerabilities through improper validation of user SID data size and associated out-of-bounds issues.
There is no public indication that CVE-2018-8754 is actively being exploited in the wild at this time.