Description
mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00016.html
Scores
CVSS v3
5.5
EPSS
0.0016
EPSS Percentile
37.1%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (1)
mgetty_project/mgetty
< 1.2.1
Published
Jul 24, 2019
Tracked Since
Feb 18, 2026