First published: Tue Aug 29 2017(Updated: )
There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function includeFile() in compileTranslationTable.c, that will lead to a denial of service attack. Product bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - There is a stack overflow in liblouis which is triggered at function includeFile()." href="show_bug.cgi?id=1484334">https://bugzilla.redhat.com/show_bug.cgi?id=1484334</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis | =3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13742 is rated as a high-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2017-13742, you should upgrade Liblouis to version 3.3.0 or later.
CVE-2017-13742 is caused by a stack-based buffer overflow in the includeFile() function of Liblouis 3.2.0.
Yes, exploitation of CVE-2017-13742 is likely as it can be triggered by providing malicious input to the affected function.
CVE-2017-13742 specifically affects Liblouis version 3.2.0.