CVE-2018-20546

HIGH

Libcaca - Integer Overflow

Title source: rule
STIX 2.1

Description

There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for the default bpp case.

References (10)

Core 10
Core References
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3860-2/
Exploit, Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1652622
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/01/msg00007.html
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3860-1/
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html
Third Party Advisory x_refsource_misc
https://github.com/cacalabs/libcaca/issues/38

Scores

CVSS v3 8.1
EPSS 0.0229
EPSS Percentile 84.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

Details

CWE
CWE-190
Status published
Products (11)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
debian/debian_linux 8.0
fedoraproject/fedora 34
fedoraproject/fedora 35
fedoraproject/fedora 36
libcaca_project/libcaca 0.99 beta19
... and 1 more
Published Dec 28, 2018
Tracked Since Feb 18, 2026