First published: Mon Jan 27 2020(Updated: )
libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Aspell | <0.60.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20433 is a vulnerability in GNU Aspell before version 0.60.8 that allows a buffer over-read for a string ending with a single '\0' byte.
CVE-2019-20433 has a severity rating of 9.1 (Critical).
GNU Aspell versions up to exclusive 0.60.8 are affected by CVE-2019-20433.
To fix CVE-2019-20433, update GNU Aspell to version 0.60.8 or later.
More information about CVE-2019-20433 can be found at http://aspell.net/buffer-overread-ucs.txt.