Vulnerability Description
mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mgetty Project | Mgetty | < 1.2.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00016.html
- https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00016.html
- https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/Third Party Advisory
FAQ
What is CVE-2019-1010190?
CVE-2019-1010190 is a vulnerability with a CVSS score of 5.5 (MEDIUM). mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: ...
How severe is CVE-2019-1010190?
CVE-2019-1010190 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1010190?
Check the references section above for vendor advisories and patch information. Affected products include: Mgetty Project Mgetty.