First published: Fri Mar 09 2012(Updated: )
A buffer overflow flaw was reported [1].[2] in pyfribidi's fribidi_utf8_to_unicode() function, due to it handling at most 3 bytes for a single unicode character. If a 4-byte utf-8 sequence was supplied, it would generate 2 unicode characters which would overflow the logical buffer. This has been fixed in pyfribidi 0.11 [3]. [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663189">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663189</a> [2] <a href="https://github.com/pediapress/pyfribidi/issues/2">https://github.com/pediapress/pyfribidi/issues/2</a> [3] <a href="https://github.com/pediapress/pyfribidi/commit/d2860c655357975e7b32d84e6b45e98f0dcecd7a">https://github.com/pediapress/pyfribidi/commit/d2860c655357975e7b32d84e6b45e98f0dcecd7a</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fribidi Pyfribidi | <=0.10.9 | |
pip/pyfribidi | <0.11.0 | 0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1176 has a moderate severity rating due to the possibility of a buffer overflow leading to potential denial of service.
To fix CVE-2012-1176, upgrade pyfribidi to version 0.11.0 or later.
CVE-2012-1176 affects pyfribidi versions up to and including 0.10.9.
Exploiting CVE-2012-1176 can potentially lead to arbitrary code execution and application crashes.
Yes, CVE-2012-1176 is a known vulnerability that has been documented and addressed in security advisories.