First published: Wed May 01 2019(Updated: )
An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Recutils | =1.8 | |
debian/recutils | <=1.8-1<=1.9-2<=1.9-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11640 has a high severity rating due to its potential for a heap-based buffer overflow.
To fix CVE-2019-11640, update GNU recutils to the latest version or apply any available patches for version 1.8.
GNU recutils version 1.8 is affected by CVE-2019-11640.
The impact of CVE-2019-11640 is a potential remote code execution due to the buffer overflow vulnerability.
Mitigating factors include restricting user inputs and employing runtime protection mechanisms like Address Space Layout Randomization (ASLR).