Vulnerability Details : CVE-2018-10922
Potential exploit
An input validation flaw exists in ttembed. With a crafted input file, an attacker may be able to trigger a denial of service condition due to ttembed trusting attacker controlled values.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2018-10922
- cpe:2.3:a:ttembed_project:ttembed:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-10922
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-10922
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Red Hat, Inc. |
CWE ids for CVE-2018-10922
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2018-10922
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10922
1610887 – (CVE-2018-10922) CVE-2018-10922 ttembed: use of untrusted length field may lead to denial of serviceExploit;Issue Tracking;Third Party Advisory
-
https://github.com/hisdeedsaredust/ttembed/issues/2
CVE-2018-10922: Use of Untrusted Length Field May Lead to Denial of Service · Issue #2 · hisdeedsaredust/ttembed · GitHubExploit;Third Party Advisory
Jump to