Stack-based buffer overflow in the get_key function in parse.c in abcm2ps through 8.13.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://drive.google.com/open?id=1HE9cht7WJPauA66acyJrEywXX8R4Hg-2 | third party advisory exploit |
https://github.com/leesavide/abcm2ps/issues/17 | third party advisory exploit |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSTB65NYYCKU7O6RF5B6CYY5IA6CA66Y/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6DUTXB4EC3TQHTTAAIBKJ54GJTF6Y7V/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGDXW2I3MY3QH4PJXLJET5QZZXMXTNWO/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html | third party advisory mailing list |