First published: Mon Sep 09 2019(Updated: )
GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU cflow | <=1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16166 is a vulnerability found in GNU cflow through 1.6 that allows a heap-based buffer over-read in the nexttoken function in parser.c.
CVE-2019-16166 has a severity value of 6.5, which is considered medium.
The affected software is GNU cflow version 1.6.
To fix CVE-2019-16166, update GNU cflow to a version higher than 1.6.
You can find more information about CVE-2019-16166 at the following link: [https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html](https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html)