libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences.
References
Link | Resource |
---|---|
https://mail.gnome.org/archives/distributor-list/2018-August/msg00001.html | Patch Third Party Advisory |
https://github.com/GNOME/pango/commit/71aaeaf020340412b8d012fe23a556c0420eda5f | Patch Third Party Advisory |
https://github.com/GNOME/pango/blob/1.42.4/NEWS | Release Notes Third Party Advisory |
https://usn.ubuntu.com/3750-1/ | Third Party Advisory |
https://www.exploit-db.com/exploits/45263/ | Exploit Patch Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201811-07 | Third Party Advisory |
http://52.117.224.77/xfce4-pdos.webm | Exploit Third Party Advisory |
https://i.redd.it/v7p4n2ptu0s11.jpg | Third Party Advisory |
https://www.exploit-db.com/exploits/45263 | Exploit Patch Third Party Advisory VDB Entry |
https://www.ign.com/articles/2018/10/16/ps4s-are-reportedly-being-bricked-and-sony-is-working-on-a-fix | Exploit Third Party Advisory |
https://www.reddit.com/r/PS4/comments/9o5efg/message_bricking_console_megathread/ | Third Party Advisory |
Information
Published : 2018-08-24 12:29
Updated : 2021-07-14 08:41
NVD link : CVE-2018-15120
Mitre link : CVE-2018-15120
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnome
- pango
canonical
- ubuntu_linux