CVE-2018-5345

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
Severity
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Atk. Vector
LOCAL
Atk. Complexity
LOW
Priv. Required
NONE
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
fedoraprojectfedora
-
gnomegcab
𝑥
≤ 0.7.4
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
debiandebian_linux
9.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_tus
7.4
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gcab
bullseye
1.4-3
fixed
bookworm
1.5-1
fixed
sid
1.6-1
fixed
trixie
1.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gcab
artful
Fixed 0.7-4ubuntu0.1
released
zesty
ignored
xenial
Fixed 0.7-1ubuntu0.1
released
trusty
dne