Vulnerability Name: | CVE-2018-6191 (CCN-138317) | ||||||||||||
Assigned: | 2018-01-24 | ||||||||||||
Published: | 2018-01-24 | ||||||||||||
Updated: | 2018-02-09 | ||||||||||||
Summary: | The js_strtod function in jsdtoa.c in Artifex MuJS through 1.0.2 has an integer overflow because of incorrect exponent validation. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
6.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-6191 Source: CCN Type: MuJS GIT Repository Fix 698920: Guard jsdtoa from integer overflow wreaking havoc Source: MISC Type: Patch, Third Party Advisory http://git.ghostscript.com/?p=mujs.git;a=commit;h=25821e6d74fab5fcc200fe5e818362e03e114428 Source: BID Type: Third Party Advisory, VDB Entry 102840 Source: CCN Type: BID-102840 Artifex MuJS CVE-2018-6191 Integer Overflow Vulnerability Source: MISC Type: Permissions Required https://bugs.ghostscript.com/show_bug.cgi?id=698920 Source: XF Type: UNKNOWN mujs-cve20186191-overflow(138317) Source: CCN Type: Packet Storm Security [01-27-2018] Artifex MuJS 1.0.2 Integer Overflow Source: EXPLOIT-DB Type: Exploit, Patch, Third Party Advisory, VDB Entry 43903 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [01-28-2018] Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-6191 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |