First published: Tue Aug 29 2017(Updated: )
There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function parseChars() in compileTranslationTable.c, that will lead to denial of service or possibly unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis | =3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13740 has a severity rating that can lead to denial of service and potentially unspecified impacts.
To mitigate CVE-2017-13740, users should upgrade to a patched version of Liblouis that addresses the buffer overflow vulnerability.
Liblouis version 3.2.0 is the only version known to be affected by CVE-2017-13740.
CVE-2017-13740 is a stack-based buffer overflow vulnerability found in Liblouis.
CVE-2017-13740 can lead to denial of service and may allow for other unspecified impacts on affected systems.