5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
0.0005 Low
EPSS
Percentile
17.2%
libespeak-ng.so is vulnerable to Stack Buffer Underflow. The vulnerability is caused by a lack of validation for the length
parameter before its passed to malloc
. An attacker can exploit this by providing an excessively small or manipulated value that could potentially lead to a buffer underflow.
CPE | Name | Operator | Version |
---|---|---|---|
libespeak-ng.so | le | 1.1.51 | |
espeak-ng:sid | eq | 1.50+dfsg-7 | |
libespeak-ng.so | le | 1.1.51 | |
espeak-ng:sid | eq | 1.50+dfsg-7 |
github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c
github.com/espeak-ng/espeak-ng/issues/1825
github.com/espeak-ng/espeak-ng/pull/1846
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PZEBWPNKPAYJMIM3AS2RP3FL6FX3HS4/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5WW6RKHRWLEMCKCQ6UZCXWC5J7UWMUQ/