Vulnerability Description
An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freexl Project | Freexl | < 1.0.5 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1547883ExploitIssue TrackingThird Party Advisory
- https://groups.google.com/forum/#%21topic/spatialite-users/b-d9iB5TDPE
- https://lists.debian.org/debian-lts-announce/2018/03/msg00000.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202007-44
- https://www.debian.org/security/2018/dsa-4129Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1547883ExploitIssue TrackingThird Party Advisory
- https://groups.google.com/forum/#%21topic/spatialite-users/b-d9iB5TDPE
- https://lists.debian.org/debian-lts-announce/2018/03/msg00000.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202007-44
- https://www.debian.org/security/2018/dsa-4129Third Party Advisory
FAQ
What is CVE-2018-7436?
CVE-2018-7436 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in FreeXL before 1.0.5. There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.
How severe is CVE-2018-7436?
CVE-2018-7436 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7436?
Check the references section above for vendor advisories and patch information. Affected products include: Freexl Project Freexl, Debian Debian Linux.