CVE-2018-25279
Buffer Overflow in jiNa OCR 1.0 Causes Denial of Service
Publication date: 2026-04-26
Last updated on: 2026-04-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jina | ocr_image_to_text | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-789 | The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in jiNa OCR Image to Text 1.0 and is a denial of service issue. It allows local attackers to crash the application by processing a specially crafted PNG file. This malformed PNG file contains an oversized buffer that triggers the crash when the application attempts to convert the file to PDF.
How can this vulnerability impact me? :
This vulnerability can impact you by causing the jiNa OCR Image to Text application to crash, resulting in a denial of service. This means the application becomes unavailable or unusable when processing a maliciously crafted PNG file, potentially disrupting workflows that rely on this software.