{"id":"MGASA-2018-0239","summary":"Updated exempi package fixes security vulnerabilities","details":"An issue was discovered in Exempi through 2.4.4. There is a stack-based\nbuffer over-read in the PostScript_MetaHandler::ParsePSFile() function\nin PostScript_Handler.cpp (CVE-2018-7729).\n\nAn issue was discovered in Exempi through 2.4.4. WEBP_Support.cpp does\nnot check whether a bitstream has a NULL value, leading to a NULL\npointer dereference in the WEBP::VP8XChunk class (CVE-2018-7731).\n\nAn issue was discovered in Exempi before 2.4.4. Integer overflow in the\nChunk class in RIFF.cpp allows remote attackers to cause a denial of\nservice (infinite loop) via crafted XMP data in a .avi file\n(CVE-2017-18233).\n\nAn issue was discovered in Exempi before 2.4.3. It allows remote\nattackers to cause a denial of service (invalid memcpy with resultant\nuse-after-free) or possibly have unspecified other impact via a .pdf\nfile containing JPEG data, related to ReconcileTIFF.cpp,\nTIFF_MemoryReader.cpp, and TIFF_Support.hpp (CVE-2017-18234).\n\nAn issue was discovered in Exempi before 2.4.3. The VPXChunk class in\nWEBP_Support.cpp does not ensure nonzero widths and heights, which\nallows remote attackers to cause a denial of service (assertion failure\nand application exit) via a crafted .webp file (CVE-2017-18235).\n\nAn issue was discovered in Exempi before 2.4.4. The\nASF_Support::ReadHeaderObject function in ASF_Support.cpp allows remote\nattackers to cause a denial of service (infinite loop) via a crafted\n.asf file (CVE-2017-18236).\n\nAn issue was discovered in Exempi before 2.4.3. The\nPostScript_Support::ConvertToDate function in PostScript_Support.cpp\nallows remote attackers to cause a denial of service (invalid pointer\ndereference and application crash) via a crafted .ps file\n(CVE-2017-18237).\n","modified":"2026-04-16T06:23:16.591969892Z","published":"2018-05-16T08:24:56Z","upstream":["CVE-2017-18233","CVE-2017-18234","CVE-2017-18235","CVE-2017-18236","CVE-2017-18237","CVE-2018-7729","CVE-2018-7731"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0239.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22871"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZTR7ZDRVKLKSI65QBRMJFDTW4EPRPZYH/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/H4PKNNGR3XYNB7B7BYNWTABCOPERDDLB/"}],"affected":[{"package":{"name":"exempi","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/exempi?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.5-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0239.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}