There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1575188 | issue tracking exploit third party advisory |
https://access.redhat.com/errata/RHSA-2018:3505 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3140 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHBA-2019:0327 | third party advisory vendor advisory |