Stack-based Buffer Overflow in GNOME Gcab Affects Multiple Platforms
CVE-2018-5345

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
12 January 2018

Summary

A vulnerability exists in GNOME Gcab that involves a stack-based buffer overflow, which can be exploited by attackers to crash the application or potentially execute arbitrary code when a specially crafted .cab file is processed. This issue can pose significant risks to affected systems, making it crucial for users to implement necessary updates and mitigations. The vulnerability was identified in version 0.7.4 and has been addressed in various vendor advisories, highlighting the importance of maintaining secure software practices.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.