Description
There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/michaelrsweet/htmldoc/issues/471
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/05/msg00014.html
Scores
CVSS v3
5.5
EPSS
0.0020
EPSS Percentile
41.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-190
Status
published
Products (2)
debian/debian_linux
9.0
htmldoc_project/htmldoc
1.9.16
Published
May 09, 2022
Tracked Since
Feb 18, 2026