First published: Tue Nov 05 2019(Updated: )
A stack buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi 1.0.0 through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text rendering, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, a crafted IRC message to be viewed in HexChat or a crafted email to be viewed in Evolution.
Affected Software | Affected Version | How to fix |
---|---|---|
libfribidi0 | >=1.0.0<=1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1768750 is high due to the potential for denial of service and arbitrary code execution.
To fix REDHAT-BUG-1768750, upgrade GNU FriBidi to version 1.0.8 or later.
REDHAT-BUG-1768750 is classified as a stack buffer overflow vulnerability.
GNU FriBidi versions 1.0.0 through 1.0.7 are affected by REDHAT-BUG-1768750.
An attacker could achieve denial of service or potentially execute arbitrary code by exploiting REDHAT-BUG-1768750.