4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
Low
liblouis.so is vulnerable to a Denial Of Service (DoS). The vulnerability is due to an out-of-bounds read caused by the matchCurrentInput
function inside lou_translateString.c
not checking the input string’s length, allowing attackers to crash the application by crafting an input file with certain translation dictionaries.
CPE | Name | Operator | Version |
---|---|---|---|
liblouis.so | le | 20.0.12 | |
liblouis.so | le | 20.0.12 |
bugzilla.suse.com/show_bug.cgi?id=1109319
github.com/advisories/GHSA-xg7f-9m4r-jh69
github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e
github.com/liblouis/liblouis/issues/635
lists.opensuse.org/archives/list/[email protected]/message/QCDNK5Q6ITKQTT77S47V5FM4FO26BMI5/
ubuntu.com/security/notices/USN-3782-1
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
Low