Vulnerability Name: | CVE-2018-12422 (CCN-144947) | ||||||||||||||||||||||||||||
Assigned: | 2018-06-15 | ||||||||||||||||||||||||||||
Published: | 2018-06-15 | ||||||||||||||||||||||||||||
Updated: | 2018-08-09 | ||||||||||||||||||||||||||||
Summary: | ** DISPUTED ** addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution through 3.29.2 might allow attackers to trigger a Buffer Overflow via a long query that is processed by the strcat function. Note: the software maintainer disputes this because "the code had computed the required string length first, and then allocated a large-enough buffer on the heap." | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-12422 Source: CCN Type: GNOME Bugzilla Bug 796174 strcat() considered unsafe for buffer overflow Source: MISC Type: Issue Tracking, Patch, Vendor Advisory https://bugzilla.gnome.org/show_bug.cgi?id=796174 Source: XF Type: UNKNOWN gnome-cve201812422-bo(144947) Source: MISC Type: Patch, Third Party Advisory https://gitlab.gnome.org/GNOME/evolution-data-server/commit/34bad6173 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |