CVE-2018-17294
Summary
| CVE | CVE-2018-17294 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-09-21 07:29:00 UTC |
| Updated | 2019-04-18 16:09:00 UTC |
| Description | The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Fix a buffer overflow · liblouis/liblouis@5e40896 · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| AddressSanitizer: stack-buffer-overflow at lou_translateString.c:358 · Issue #635 · liblouis/liblouis · GitHub |
MISC |
github.com |
Exploit, Patch, Third Party Advisory |
| Liblouis CVE-2018-17294 Stack Based Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2019:1160-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| USN-3782-1: Liblouis vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 296079 Oracle Solaris 11.4 Support Repository Update (SRU) 15.5.0 Missing (CPUOCT2019)