Vulnerability identifier: #VU38401
Vulnerability risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Liblouis
Universal components / Libraries /
Libraries used by multiple products
Vendor: Liblouis
Description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 3.2.0, triggered in the function resolveSubtable() in compileTranslationTable.c. It will lead to denial of service or remote code execution.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Liblouis: 3.2.0
External links
http://www.securityfocus.com/bid/100607
http://bugzilla.redhat.com/show_bug.cgi?id=1484299
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.