First published: Mon Sep 18 2017(Updated: )
A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.
Affected Software | Affected Version | How to fix |
---|---|---|
Liblouis | ||
Orca Orca |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1492701 is high due to the potential for stack-based buffer overflow that can lead to application crashes or arbitrary code execution.
To fix REDHAT-BUG-1492701, update to the latest version of liblouis that includes the patch for the buffer overflow vulnerability.
Applications that use liblouis, such as Orca, are affected by REDHAT-BUG-1492701.
Yes, REDHAT-BUG-1492701 can be exploited remotely if an attacker provides a malicious file that causes the vulnerability to trigger.
Liblouis is a library for translating text into braille and is the source of the buffer overflow vulnerability identified in REDHAT-BUG-1492701.