Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xdngyLTU5ZzgtOGhwaM4AAwlv
docconv vulnerable to Memory Allocation with Excessive Size Value
A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText
. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 can address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xdngyLTU5ZzgtOGhwaM4AAwlv
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: 2 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Identifiers: GHSA-qvx2-59g8-8hph, CVE-2022-4741
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-4741
- https://github.com/sajari/docconv/pull/111
- https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301
- https://github.com/sajari/docconv/releases/tag/v1.2.1
- https://vuldb.com/?ctiid.216779
- https://vuldb.com/?id.216779
- https://pkg.go.dev/vuln/GO-2022-1188
- https://github.com/advisories/GHSA-qvx2-59g8-8hph
Blast Radius: 16.3
Affected Packages
go:code.sajari.com/docconv
Dependent packages: 56Dependent repositories: 322
Downloads:
Affected Version Ranges: < 1.2.1
Fixed in: 1.2.1
All affected versions: 1.0.0, 1.1.0, 1.2.0
All unaffected versions: 1.2.1, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8
go:github.com/sajari/docconv
Dependent packages: 0Dependent repositories: 1
Downloads:
Affected Version Ranges: < 1.2.1
Fixed in: 1.2.1
All affected versions: 1.0.0, 1.1.0, 1.2.0
All unaffected versions: 1.2.1, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8