First published: Tue Feb 16 2010(Updated: )
Buffer overflow in the log2vis_utf8 function in pyfribidi.c in GNU FriBidi 0.19.1, 0.19.2, and possibly other versions, as used in PyFriBidi 0.10.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Arabic UTF-8 string that causes original 2-byte UTF-8 sequences to be transformed into 3-byte sequences.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU FriBidi | =0.19.1 | |
GNU FriBidi | =0.19.2 | |
Kobi Zamir Pyfribidi | =0.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3444 has a high severity rating due to the potential for denial of service and arbitrary code execution.
To fix CVE-2010-3444, upgrade GNU FriBidi to version 0.19.3 or later, and ensure that PyFriBidi is updated as well.
CVE-2010-3444 affects GNU FriBidi versions 0.19.1 and 0.19.2, as well as PyFriBidi version 0.10.1.
CVE-2010-3444 is a buffer overflow vulnerability that can be exploited via crafted input.
CVE-2010-3444 may lead to application crashes and could allow remote attackers to execute arbitrary code.