First published: Tue Aug 29 2017(Updated: )
There is a buffer overflow in Liblouis 3.2.0, triggered in the function _lou_showString() in utils.c, that will lead to a denial of service attack. Product bug: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - There is a heap overflow in liblouis which is triggered at function _lou_showString()." href="show_bug.cgi?id=1484335">https://bugzilla.redhat.com/show_bug.cgi?id=1484335</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis | =3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13743 is classified as a denial of service vulnerability due to a buffer overflow in Liblouis 3.2.0.
To fix CVE-2017-13743, upgrade to the latest version of Liblouis that addresses the buffer overflow issue.
CVE-2017-13743 specifically affects Liblouis version 3.2.0.
Exploitation of CVE-2017-13743 can lead to a denial of service condition, disrupting the availability of the software.
CVE-2017-13743 does not require authentication for exploitation, making it a critical concern for all users of the affected version.