First published: Tue Apr 21 2020(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/re2c | 2.0.3-1 3.0-2 3.1-1 | |
re2c | =1.3 | |
Ubuntu Linux | =19.10 | |
Ubuntu Linux | =20.04 | |
Ubuntu | =19.10 | |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11958 is classified as a high-severity vulnerability due to its potential for remote exploitation via a heap-based buffer overflow.
To fix CVE-2020-11958, it is recommended to upgrade to re2c version 2.0.3-1 or later, depending on your package manager.
CVE-2020-11958 affects re2c version 1.3, as well as specific versions of Debian and Ubuntu Linux distributions.
CVE-2020-11958 is a heap-based buffer overflow vulnerability that occurs in the Scanner::fill function.
Yes, CVE-2020-11958 can potentially be exploited remotely due to the nature of the heap-based buffer overflow.