HIGH7.8
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
CVSS 2.0MEDIUM 6.8
CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:PCVSS 3.xHIGH 7.8
CVSS:3.x/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HReferences
- https://access.redhat.com/errata/RHSA-2018:0350
- https://bugzilla.redhat.com/show_bug.cgi?id=1527296
- https://usn.ubuntu.com/3546-1/
- https://www.debian.org/security/2018/dsa-4095
- https://access.redhat.com/errata/RHSA-2018:0350
- https://bugzilla.redhat.com/show_bug.cgi?id=1527296
- https://usn.ubuntu.com/3546-1/
- https://www.debian.org/security/2018/dsa-4095