The liblnk_data_string_get_utf8_string_size function in liblnk_data_string.c in liblnk through 2018-04-19 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted lnk file. NOTE: the vendor has disputed this as described in libyal/liblnk issue 33 on GitHub
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| http://seclists.org/fulldisclosure/2018/Jun/33 |
|
History
Fri, 20 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:24:03.673Z
Reserved: 2018-06-11T00:00:00.000Z
Link: CVE-2018-12096
Updated: 2024-08-05T08:24:03.673Z
Status : Modified
Published: 2018-06-19T21:29:00.817
Modified: 2024-11-21T03:44:35.320
Link: CVE-2018-12096
No data.
OpenCVE Enrichment
No data.
Weaknesses