Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-25309

Опубликовано: 06 сент. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.5

Описание

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

РелизСтатусПримечание
bionic

released

0.19.7-2ubuntu0.1
devel

released

1.0.8-2ubuntu3.1
esm-infra-legacy/trusty

ignored

end of standard support
esm-infra/bionic

not-affected

0.19.7-2ubuntu0.1
esm-infra/focal

not-affected

1.0.8-2ubuntu0.1
esm-infra/xenial

released

0.19.7-1ubuntu0.1~esm1
focal

released

1.0.8-2ubuntu0.1
impish

released

1.0.8-2ubuntu2.1
jammy

released

1.0.8-2ubuntu3.1
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 2%
0.00016
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 3 лет назад

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

CVSS3: 5.5
nvd
почти 3 года назад

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

CVSS3: 5.5
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 5.5
debian
почти 3 года назад

A heap-based buffer overflow flaw was found in the Fribidi package and ...

CVSS3: 5.5
github
почти 3 года назад

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

EPSS

Процентиль: 2%
0.00016
Низкий

5.5 Medium

CVSS3