Heap-based Buffer Overflow Affecting libwpd package, versions *


Severity

Recommended
0.0
low
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
1.04% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL6-LIBWPD-1367094
  • published26 Jul 2021
  • disclosed7 Sept 2017

Introduced: 7 Sep 2017

CVE-2017-14226  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:6 libwpd.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libwpd package and not the libwpd package as distributed by RHEL. See How to fix? for RHEL:6 relevant fixed versions and status.

WP1StylesListener.cpp, WP5StylesListener.cpp, and WP42StylesListener.cpp in libwpd 0.10.1 mishandle iterators, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the WPXTableList class in WPXTable.cpp). This vulnerability can be triggered in LibreOffice before 5.3.7. It may lead to suffering a remote attack against a LibreOffice application.

CVSS Scores

version 3.1