Description
GNU Libextractor through 1.8 has an out-of-bounds read vulnerability in the function history_extract() in plugins/ole2_extractor.c, related to EXTRACTOR_common_convert_to_utf8 in common/convert.c.
References (6)
Core 6
Core References
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4361
Release Notes, Third Party Advisory x_refsource_misc
https://gnunet.org/git/libextractor.git/tree/ChangeLog
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/106300
Patch, Third Party Advisory x_refsource_misc
https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://gnunet.org/bugs/view.php?id=5493
Scores
CVSS v3
6.5
EPSS
0.0057
EPSS Percentile
68.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (3)
debian/debian_linux
8.0
debian/debian_linux
9.0
gnu/libextractor
< 1.8
Published
Dec 24, 2018
Tracked Since
Feb 18, 2026