First published: Wed May 09 2018(Updated: )
There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack. Original bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - Stack Buffer Overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c" href="show_bug.cgi?id=1575188">https://bugzilla.redhat.com/show_bug.cgi?id=1575188</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libgxps | <=0.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1576175 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1576175, update libgxps to a version higher than 0.3.0.
REHAT-BUG-1576175 is caused by a stack-based buffer over-read in the gxps_images_guess_content_type function of libgxps.
Users of GNOME libgxps version 0.3.0 and below are affected by REDHAT-BUG-1576175.
If REDHAT-BUG-1576175 is exploited, it can lead to a remote denial of service attack.