First published: Wed Aug 12 2015(Updated: )
The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libidn | <=1.30 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Fedora | =21 | |
Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2059 has a severity rating that indicates it allows attackers to exploit memory vulnerabilities through invalid UTF-8 characters.
To fix CVE-2015-2059, update libidn to version 1.31 or later.
CVE-2015-2059 affects GNU libidn versions up to 1.30, as well as specific versions of openSUSE and Fedora.
CVE-2015-2059 may allow context-dependent attackers to read system memory, potentially leading to sensitive data exposure.
The potential impacts of CVE-2015-2059 include unauthorized memory access and possible disruption of application behavior.