CVE-2018-17294

The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
Configurations

Configuration 1 (hide)

cpe:2.3:a:liblouis:liblouis:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:54

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html - Third Party Advisory
References () http://www.securityfocus.com/bid/105511 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105511 - Third Party Advisory, VDB Entry
References () https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e - Patch, Third Party Advisory () https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e - Patch, Third Party Advisory
References () https://github.com/liblouis/liblouis/issues/635 - Exploit, Patch, Third Party Advisory () https://github.com/liblouis/liblouis/issues/635 - Exploit, Patch, Third Party Advisory
References () https://usn.ubuntu.com/3782-1/ - Third Party Advisory () https://usn.ubuntu.com/3782-1/ - Third Party Advisory

Information

Published : 2018-09-21 07:29

Updated : 2024-11-21 03:54


NVD link : CVE-2018-17294

Mitre link : CVE-2018-17294

CVE.ORG link : CVE-2018-17294


JSON object : View

Products Affected

canonical

  • ubuntu_linux

liblouis

  • liblouis

opensuse

  • leap
CWE
CWE-125

Out-of-bounds Read