Логотип exploitDog
bind:CVE-2019-18397
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-18397

Количество 11

Количество 11

ubuntu логотип

CVE-2019-18397

около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2019-18397

больше 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2019-18397

около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-18397

около 6 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() functio ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1655-1

больше 4 лет назад

Security update for fribidi

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0763-1

больше 4 лет назад

Security update for fribidi

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1655-1

больше 4 лет назад

Security update for fribidi

EPSS: Низкий
github логотип

GHSA-fcm8-q275-jqv2

больше 3 лет назад

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4361

около 6 лет назад

ELSA-2019-4361: fribidi security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4326

около 6 лет назад

ELSA-2019-4326: fribidi security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2020-01328

около 6 лет назад

Уязвимость функции fribidi_get_par_embedding_levels_ex() (lib/fribidi-bidi.c) библиотеки GNU FriBidi, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-18397

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-18397

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-18397

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
debian логотип
CVE-2019-18397

A buffer overflow in the fribidi_get_par_embedding_levels_ex() functio ...

CVSS3: 7.8
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1655-1

Security update for fribidi

1%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0763-1

Security update for fribidi

1%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1655-1

Security update for fribidi

1%
Низкий
больше 4 лет назад
github логотип
GHSA-fcm8-q275-jqv2

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

1%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2019-4361

ELSA-2019-4361: fribidi security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4326

ELSA-2019-4326: fribidi security update (IMPORTANT)

около 6 лет назад
fstec логотип
BDU:2020-01328

Уязвимость функции fribidi_get_par_embedding_levels_ex() (lib/fribidi-bidi.c) библиотеки GNU FriBidi, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 7.8
1%
Низкий
около 6 лет назад

Уязвимостей на страницу