CVE-2022-27114
Gentoo Linux Security Advisory 202405-07
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function.
Se presenta una vulnerabilidad en htmldoc versión 1.9.16. En la función image_load_jpeg image.cxx cuando llama a malloc,"img-)width" e "img-)height" son lo suficientemente grandes como para causar un desbordamiento de enteros. Así, la función malloc puede devolver un blosmaller de pila más grande que el tamaño esperado, y causará un desbordamiento de búfer/error de límite de dirección en la función jpeg_read_scanlines
It was discovered that HTMLDOC incorrectly handled memory in the image_set_mask, git_read_lzw, write_header and write_node functions, which could lead to a heap buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was discovered that HTMLDOC incorrectly handled memory in the gif_get_code function, which could lead to a segmentation fault. If a user or application were tricked into opening a crafted GIF file, an attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-14 CVE Reserved
- 2022-05-09 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/05/msg00014.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://github.com/michaelrsweet/htmldoc/issues/471 | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275 | 2022-05-17 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Htmldoc Project Search vendor "Htmldoc Project" | Htmldoc Search vendor "Htmldoc Project" for product "Htmldoc" | 1.9.16 Search vendor "Htmldoc Project" for product "Htmldoc" and version "1.9.16" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|