Certain input files may trigger an integer overflow in ttembed input file processing. This overflow could potentially lead to corruption of the input file due to a lack of checking return codes of fgetc/fputc function calls.
https://github.com/hisdeedsaredust/ttembed/issues/3
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10921
Source: Mitre, NVD
Published: 2018-08-02
Updated: 2019-10-09
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High