Stack-based Buffer Overflow in GNOME Gcab Affects Multiple Platforms
CVE-2018-5345
7.8HIGH
Summary
A vulnerability exists in GNOME Gcab that involves a stack-based buffer overflow, which can be exploited by attackers to crash the application or potentially execute arbitrary code when a specially crafted .cab file is processed. This issue can pose significant risks to affected systems, making it crucial for users to implement necessary updates and mitigations. The vulnerability was identified in version 0.7.4 and has been addressed in various vendor advisories, highlighting the importance of maintaining secure software practices.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved