CVE-2018-7730

MEDIUM

Exempi <2.4.4 - Memory Corruption

Title source: llm
STIX 2.1

Description

An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp, leading to a heap-based buffer over-read in the PSD_MetaHandler::CacheFileData() function.

References (6)

Core 6
Core References
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugs.freedesktop.org/show_bug.cgi?id=105204
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3668-1/
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:2048

Scores

CVSS v3 5.5
EPSS 0.0011
EPSS Percentile 28.8%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (5)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 17.10
debian/debian_linux 7.0
exempi_project/exempi < 2.4.4
Published Mar 06, 2018
Tracked Since Feb 18, 2026