The process_file function in reader.c in libdoc through 2017-10-23 has a heap-based buffer over-read that allows attackers to cause a denial of service (application crash) via a crafted file.
References
Link | Resource |
---|---|
https://github.com/uvoteam/libdoc/issues/2 | Exploit Third Party Advisory |
https://github.com/uvoteam/libdoc/issues/2 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/uvoteam/libdoc/issues/2 - Exploit, Third Party Advisory |
Information
Published : 2018-12-25 17:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20451
Mitre link : CVE-2018-20451
CVE.ORG link : CVE-2018-20451
JSON object : View
Products Affected
libdoc_project
- libdoc
CWE
CWE-125
Out-of-bounds Read