Heap-Based Buffer Overflow Vulnerability in PSPP by GNU
CVE-2018-20230

7.8HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
19 December 2018

Summary

A buffer overflow vulnerability exists in PSPP version 1.2.0 due to improper handling of memory allocation in the function read_bytes_internal. This flaw enables attackers to exploit the application, potentially leading to crashes or security breaches, which can cause denial of service attacks or other unspecified impacts that compromise the integrity of the affected system.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.