Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-18397

Опубликовано: 13 нояб. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

РелизСтатусПримечание
bionic

not-affected

0.19.7-2
devel

not-affected

1.0.7-1.1
disco

released

1.0.5-3.1ubuntu0.19.04.1
eoan

released

1.0.5-3.1ubuntu0.19.10.1
esm-infra-legacy/trusty

not-affected

0.19.6-1
esm-infra/bionic

not-affected

0.19.7-2
esm-infra/xenial

not-affected

0.19.7-1
precise/esm

not-affected

0.19.2-1
trusty

ignored

end of standard support
trusty/esm

not-affected

0.19.6-1

Показывать по

EPSS

Процентиль: 74%
0.00807
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
больше 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
nvd
около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
debian
около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() functio ...

suse-cvrf
больше 4 лет назад

Security update for fribidi

suse-cvrf
больше 4 лет назад

Security update for fribidi

EPSS

Процентиль: 74%
0.00807
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3