Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-10887 CVE-2018-10888 |
CWE-ID | CWE-125 CWE-190 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
libgit2 Universal components / Libraries / Libraries used by multiple products |
Vendor | libgit2.github.com |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU13842
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-10887
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information or cause DoS condition on the target system.
The vulnerability exists due to integer overflow when unexpected sign extension in the git_delta_apply function of the delta.c file. A remote unauthenticated attacker can trigger an out-of-bounds read condition, bypass bounds check and read sensitive memory information or cause the service to crash.
MitigationUpdate to version 0.26.5 or 0.27.3.
Vulnerable software versionslibgit2: 0.24.4.0 - 0.27.2
CPE2.3 External linkshttps://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22
https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU13843
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-10888
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to a missing check in the git_delta_apply function, as defined in the delta.c file. A remote unauthenticated attacker can trick the victim into opening a specially crafted binary delta file, trigger an out-of-bounds read condition and cause the service to crash.
MitigationUpdate to version 0.26.5 or 0.27.3.
Vulnerable software versionslibgit2: 0.24.4.0 - 0.27.2
CPE2.3https://github.com/libgit2/libgit2/commit/9844d38bed10e9ff17174434b3421b227ae710f3remote
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.