First published: Fri Sep 21 2018(Updated: )
The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis Liblouis | <3.7.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
openSUSE Leap | =15.0 | |
ubuntu/liblouis | <3.5.0-1ubuntu0.3 | 3.5.0-1ubuntu0.3 |
ubuntu/liblouis | <3.7.0-1 | 3.7.0-1 |
debian/liblouis | 3.16.0-1 3.24.0-1 3.30.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17294 is a vulnerability in Liblouis prior to version 3.7 that allows attackers to cause a denial of service (application crash) by crafting a malicious input file.
The severity of CVE-2018-17294 is rated as medium with a CVSS score of 6.5.
CVE-2018-17294 can be exploited by crafting a special input file with certain translation dictionaries to trigger an out-of-bounds read, leading to a denial of service.
Liblouis versions prior to 3.7 are affected by CVE-2018-17294.
To fix CVE-2018-17294, update Liblouis to version 3.7.0 or later.