#VU55502 Heap-based buffer overflow in Aspell - CVE-2019-25051
Published: August 3, 2021
Aspell
GNU
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list). A remote attacker can trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml
- https://lists.debian.org/debian-lts-announce/2021/07/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H7E4EI7F6TVN7K6XWU6HSANMCOKKEREE/