First published: Tue Dec 12 2023(Updated: )
Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the function ReadClause at readclause.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/espeak-ng | <1.49.2+dfsg-1ubuntu0.1~ | 1.49.2+dfsg-1ubuntu0.1~ |
ubuntu/espeak-ng | <1.50+dfsg-6ubuntu0.1 | 1.50+dfsg-6ubuntu0.1 |
ubuntu/espeak-ng | <1.50+dfsg-10ubuntu0.1 | 1.50+dfsg-10ubuntu0.1 |
ubuntu/espeak-ng | <1.51+dfsg-11ubuntu0.1 | 1.51+dfsg-11ubuntu0.1 |
ubuntu/espeak-ng | <1.51+dfsg-12 | 1.51+dfsg-12 |
debian/espeak-ng | <=1.50+dfsg-7+deb11u1 | 1.51+dfsg-10+deb12u1 1.51+dfsg-12 |
Red Hat Speech-Dispatcher-espeak-ng | =1.52-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49993 has a high severity due to the potential for a buffer overflow that could lead to arbitrary code execution.
To fix CVE-2023-49993, update to a version of Espeak-ng that is patched against this vulnerability, such as 1.49.2+dfsg-1ubuntu0.1~ for Ubuntu Bionic or other remedied versions for different distributions.
CVE-2023-49993 affects Espeak-ng version 1.52-dev.
Yes, CVE-2023-49993 may be exploited remotely if the vulnerable software is exposed to untrusted inputs.
CVE-2023-49993 is classified as a buffer overflow vulnerability.