First published: Tue Nov 05 2019(Updated: )
A stack buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi 1.0.0 through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text rendering, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, a crafted IRC message to be viewed in HexChat or a crafted email to be viewed in Evolution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/fribidi | <=1.0.7-1<=1.0.5-3.1 | 1.0.5-3.1+deb10u1 1.0.7-1.1 |
GNU FriBidi | >=1.0.0<=1.0.7 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/fribidi | 1.0.8-2+deb11u1 1.0.8-2.1 1.0.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-18397.
CVE-2019-18397 has a severity score of 7.8, which is considered high.
The software affected by CVE-2019-18397 is GNU FriBidi through versions 1.0.7.
An attacker can exploit CVE-2019-18397 by delivering crafted text content to a user, which when rendered by an application, can cause a denial of service or possibly execute arbitrary code.
Yes, there are fixes available for CVE-2019-18397. The recommended versions to remediate the vulnerability are 1.0.5-3.1+deb10u1 and 1.0.7-1.1.