Vulnerability Description
The ledger::parse_date_mask_routine function in times.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ledger-Cli | Ledger | 3.1.1 |
Related Weaknesses (CWE)
References
- http://bugs.ledger-cli.org/show_bug.cgi?id=1224Issue TrackingThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html
- https://security.gentoo.org/glsa/202004-05
- http://bugs.ledger-cli.org/show_bug.cgi?id=1224Issue TrackingThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00029.html
- https://security.gentoo.org/glsa/202004-05
FAQ
What is CVE-2017-12482?
CVE-2017-12482 is a vulnerability with a CVSS score of 7.8 (HIGH). The ledger::parse_date_mask_routine function in times.cc in Ledger 3.1.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspe...
How severe is CVE-2017-12482?
CVE-2017-12482 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-12482?
Check the references section above for vendor advisories and patch information. Affected products include: Ledger-Cli Ledger.