SB2019102434 - Out-of-bounds read in aspell (Alpine package)
Published: October 24, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2019-17544)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition when processing an isolated character within the acommon::unescape() function in common/getdata.cpp file in GNU Aspell. A remote attacker can create a specially crafted Excel file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system or crash the application.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=ea01bb226907d1841c222a4d45832c3c36378115
- https://git.alpinelinux.org/aports/commit/?id=04fd297cbeb9d82c92edd1d0295cc3df604e8f76
- https://git.alpinelinux.org/aports/commit/?id=4439c8307bf1bcbfd41da5d84bea80adf54c5273
- https://git.alpinelinux.org/aports/commit/?id=86ef329cc2823eae118325dcc977c43bd7368d53
- https://git.alpinelinux.org/aports/commit/?id=b536611ee6298539033c380cc5f69a7e7a433e8e