
Cloud Vulnerability DB
A community-led vulnerabilities database
A stack-based buffer overflow vulnerability was discovered in GOCR (Optical Character Recognition program) through version 0.53-20200802, specifically in the try_to_divide_boxes() function within pgm2asc.c. The vulnerability was initially reported on August 3, 2020, and was assigned CVE-2021-33481 on May 20, 2021 (CVE Mitre, NVD).
The vulnerability is a stack-based buffer overflow that occurs in the try_to_divide_boxes() function at line 2648:39 in pgm2asc.c. The issue was identified using AddressSanitizer, which detected a stack-buffer-overflow during memory access operations. The problematic read operation of size 4 was detected at a specific memory address, affecting the 'ci' variable in the stack frame (SourceForge Bug).
The vulnerability could potentially lead to arbitrary code execution in affected systems running GOCR. The severity of this issue has been marked as high in some security advisories (Gentoo Security).
Gentoo has discontinued support for GOCR and recommends users unmerge the package using the command 'emerge --ask --depclean "app-text/gocr"'. For other distributions, users are advised to update to patched versions where available or remove the software if it's not essential (Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."