CVE-2018-12422

addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution through 3.29.2 might allow attackers to trigger a Buffer Overflow via a long query that is processed by the strcat function. NOTE: the software maintainer disputes this because "the code had computed the required string length first, and then allocated a large-enough buffer on the heap.
References
Link Resource
https://bugzilla.gnome.org/show_bug.cgi?id=796174 Issue Tracking Patch Vendor Advisory
https://gitlab.gnome.org/GNOME/evolution-data-server/commit/34bad6173 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:52

Type Values Removed Values Added
Summary ** DISPUTED ** addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution through 3.29.2 might allow attackers to trigger a Buffer Overflow via a long query that is processed by the strcat function. NOTE: the software maintainer disputes this because "the code had computed the required string length first, and then allocated a large-enough buffer on the heap." addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution through 3.29.2 might allow attackers to trigger a Buffer Overflow via a long query that is processed by the strcat function. NOTE: the software maintainer disputes this because "the code had computed the required string length first, and then allocated a large-enough buffer on the heap.

Information

Published : 2018-06-15 16:29

Updated : 2024-08-05 09:15


NVD link : CVE-2018-12422

Mitre link : CVE-2018-12422

CVE.ORG link : CVE-2018-12422


JSON object : View

Products Affected

gnome

  • evolution
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer