Description
Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.
References (6)
Core 6
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/leesavide/abcm2ps/issues/84
Patch, Third Party Advisory x_refsource_misc
https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html
Scores
CVSS v3
5.5
EPSS
0.0072
EPSS Percentile
72.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-787
Status
published
Products (5)
abcm2ps_project/abcm2ps
8.14.11
debian/debian_linux
9.0
fedoraproject/fedora
34
fedoraproject/fedora
35
fedoraproject/fedora
36
Published
Mar 10, 2022
Tracked Since
Feb 18, 2026