Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-17294

Опубликовано: 24 сент. 2018
Источник: redhat
CVSS3: 4.7

Описание

The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7liblouisNot affected
Red Hat Enterprise Linux 8liblouisFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1632834liblouis: Stack-based buffer over-read in matchCurrentInput function lou_translateString.c

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.

CVSS3: 6.5
nvd
больше 7 лет назад

The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.

CVSS3: 6.5
debian
больше 7 лет назад

The matchCurrentInput function inside lou_translateString.c of Libloui ...

suse-cvrf
больше 5 лет назад

Security update for liblouis

suse-cvrf
почти 7 лет назад

Security update for liblouis

4.7 Medium

CVSS3