Upstream information

CVE-2021-32435 at MITRE

Description

Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 5.5
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1197355 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP3
  • abcm2ps >= 8.14.13-bp153.2.3.1
Patchnames:
openSUSE-2022-100
openSUSE Leap 15.3
  • abcm2ps >= 8.14.13-bp153.2.3.1
Patchnames:
openSUSE-2022-100
openSUSE Tumbleweed
  • abcm2ps >= 8.14.13-2.1
Patchnames:
openSUSE Tumbleweed GA abcm2ps-8.14.13-2.1


SUSE Timeline for this CVE

CVE page created: Fri Mar 11 03:04:43 2022
CVE page last modified: Wed Oct 26 23:16:15 2022