The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
References
Link | Resource |
---|---|
https://github.com/liblouis/liblouis/issues/635 | Exploit Patch Third Party Advisory |
https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e | Patch Third Party Advisory |
https://usn.ubuntu.com/3782-1/ | Third Party Advisory |
http://www.securityfocus.com/bid/105511 | Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-09-21 00:29
Updated : 2019-04-18 09:09
NVD link : CVE-2018-17294
Mitre link : CVE-2018-17294
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
canonical
- ubuntu_linux
liblouis
- liblouis
opensuse
- leap