CVE-2018-3836
Published: 24 April 2018
An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.
From the Ubuntu Security Team
It was discovered that Leptonica incorrectly handled certain input arguments. An attacker could possibly use this issue to execute arbitrary commands.
Priority
Status
Package | Release | Status |
---|---|---|
leptonlib Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(1.75.3-2)
|
|
cosmic |
Not vulnerable
(1.75.3-2)
|
|
disco |
Not vulnerable
(1.75.3-2)
|
|
eoan |
Not vulnerable
(1.75.3-2)
|
|
focal |
Not vulnerable
(1.75.3-2)
|
|
groovy |
Not vulnerable
(1.75.3-2)
|
|
hirsute |
Not vulnerable
(1.75.3-2)
|
|
impish |
Not vulnerable
(1.75.3-2)
|
|
jammy |
Not vulnerable
(1.75.3-2)
|
|
trusty |
Released
(1.70.1-1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Needs triage
|
|
xenial |
Released
(1.73-1ubuntu0.1~esm1)
Available with Ubuntu Pro |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |