Vulnerability Description
Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fgetc/fputc function calls.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ttembed Project | Ttembed | - |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10921ExploitIssue TrackingThird Party Advisory
- https://github.com/hisdeedsaredust/ttembed/issues/3ExploitThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10921ExploitIssue TrackingThird Party Advisory
- https://github.com/hisdeedsaredust/ttembed/issues/3ExploitThird Party Advisory
FAQ
What is CVE-2018-10921?
CVE-2018-10921 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fge...
How severe is CVE-2018-10921?
CVE-2018-10921 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10921?
Check the references section above for vendor advisories and patch information. Affected products include: Ttembed Project Ttembed.