CVE-2018-10887

MEDIUM

Description

A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addresses or cause a Denial of Service.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1598021

https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a

https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22

https://github.com/libgit2/libgit2/releases/tag/v0.27.3

https://lists.debian.org/debian-lts-announce/2018/08/msg00024.html

Details

Source: MITRE

Published: 2018-07-10

Updated: 2019-10-09

Type: CWE-125

Risk Information

CVSS v2.0

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

Impact Score: 5.2

Exploitability Score: 2.8

Severity: HIGH