{"id":"UBUNTU-CVE-2018-20451","details":"The process_file function in reader.c in libdoc through 2017-10-23 has a heap-based buffer over-read that allows attackers to cause a denial of service (application crash) via a crafted file.","modified":"2026-04-27T15:32:07.289792Z","published":"2018-12-25T17:29:00Z","upstream":["CVE-2018-20451"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20451"},{"type":"REPORT","url":"https://github.com/uvoteam/libdoc/issues/2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-20451"}],"affected":[{"package":{"name":"catdoc","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/catdoc@1:0.94.3~git20160113.dbc9ec6+dfsg-1+deb9u1build0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.94.4-1.1","1:0.94.3~git20151007.fd634c2+dfsg-2","1:0.94.3~git20151007.fd634c2+dfsg-3","1:0.94.3~git20160113.dbc9ec6+dfsg-1","1:0.94.3~git20160113.dbc9ec6+dfsg-1+deb9u1build0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.94.3~git20160113.dbc9ec6+dfsg-1+deb9u1build0.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}},{"package":{"name":"catdoc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/catdoc@1:0.95-4.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:0.95-3","1:0.95-4.1"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.95-4.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}},{"package":{"name":"catdoc","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/catdoc@1:0.95-4.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:0.95-4.1"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.95-4.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}},{"package":{"name":"catdoc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/catdoc@1:0.95-5?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:0.95-4.1","1:0.95-4.2","1:0.95-5"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.95-5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}},{"package":{"name":"catdoc","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/catdoc@1:0.95-5build1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:0.95-5","1:0.95-5build1"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.95-5build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}},{"package":{"name":"catdoc","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/catdoc@1:0.95-6?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:0.95-5build1","1:0.95-6"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.95-6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}},{"package":{"name":"catdoc","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/catdoc@1:0.95-6build1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:0.95-6","1:0.95-6build1"],"ecosystem_specific":{"binaries":[{"binary_name":"catdoc","binary_version":"1:0.95-6build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}