First published: Mon Apr 05 2021(Updated: )
Integer overflow in the htmldoc 1.9.11 and before may allow attackers to execute arbitrary code and cause a denial of service that is similar to <a href="https://access.redhat.com/security/cve/CVE-2017-9181">CVE-2017-9181</a>. Upstream bug: <a href="https://github.com/michaelrsweet/htmldoc/issues/423">https://github.com/michaelrsweet/htmldoc/issues/423</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Htmldoc Project Htmldoc | <=1.9.11 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-20308 is critical with a CVSS v3.1 score of 9.8.
The affected software for CVE-2021-20308 includes htmldoc version 1.9.11 and Debian Linux version 9.0.
An attacker can exploit CVE-2021-20308 by leveraging an integer overflow vulnerability to execute arbitrary code and cause a denial of service.
Yes, there are fixes and patches available for CVE-2021-20308. It is recommended to update to a patched version of the affected software.
You can find more information about CVE-2021-20308 in the references provided: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=1946289), [GitHub](https://github.com/michaelrsweet/htmldoc/issues/423), [Debian LTS Announce](https://lists.debian.org/debian-lts-announce/2021/07/msg00000.html).