gnome libgxps CVE-2018-10767 in GNOME and Red Hat Products
Published on May 6, 2018

product logo product logo
There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.

Vendor Advisory Vendor Advisory Vendor Advisory NVD


Products Associated with CVE-2018-10767

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2018-10767 are published in these products:

 
 
 
 
 

Exploit Probability

EPSS
0.85%
Percentile
74.82%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.