Vulnerability Description
An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
CVSS Score
8.8
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 16.04 |
| Libraw | Libraw | 0.18.9 |
Related Weaknesses (CWE)
References
- https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3PatchVendor Advisory
- https://github.com/LibRaw/LibRaw/issues/144Third Party Advisory
- https://usn.ubuntu.com/3639-1/Third Party Advisory
- https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3PatchVendor Advisory
- https://github.com/LibRaw/LibRaw/issues/144Third Party Advisory
- https://usn.ubuntu.com/3639-1/Third Party Advisory
FAQ
What is CVE-2018-10528?
CVE-2018-10528 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
How severe is CVE-2018-10528?
CVE-2018-10528 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10528?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Libraw Libraw.