Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-13742

Опубликовано: 29 авг. 2017
Источник: debian
EPSS Низкий

Описание

There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a remote denial of service attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
liblouisfixed3.3.0-1package
liblouisfixed3.0.0-3+deb9u1stretchpackage
liblouisno-dsajessiepackage
liblouisnot-affectedwheezypackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1484334

  • Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c

EPSS

Процентиль: 60%
0.004
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 8 лет назад

There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a remote denial of service attack.

CVSS3: 3.3
redhat
около 8 лет назад

There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a remote denial of service attack.

CVSS3: 6.5
nvd
около 8 лет назад

There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a remote denial of service attack.

CVSS3: 6.5
github
больше 3 лет назад

There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a remote denial of service attack.

oracle-oval
около 8 лет назад

ELSA-2017-3111: liblouis security update (MODERATE)

EPSS

Процентиль: 60%
0.004
Низкий