First published: Fri Dec 20 2019(Updated: )
Lout 3.40 has a buffer overflow in the StringQuotedWord() function in z39.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lout | =3.40 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE Backports | =15.0-sp2 | |
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Fedora | =31 | |
Fedora | =32 | |
Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19917 is classified as a high severity vulnerability due to its potential for remote code execution via buffer overflow.
To fix CVE-2019-19917, you should update Lout to the latest patched version or apply the necessary security updates provided by your distribution.
CVE-2019-19917 specifically affects Lout version 3.40.
CVE-2019-19917 exploits a buffer overflow vulnerability in the StringQuotedWord() function within z39.c.
Yes, CVE-2019-19917 is present in specific openSUSE Backports and Leap versions mentioned in the vulnerability report.