6.8
CVSSv2

CVE-2017-13739

Published: 29/08/2017 Updated: 07/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 3.2.0, triggered in the function resolveSubtable() in compileTranslationTable.c. It will lead to denial of service or remote code execution.

Vulnerable Product Search on Vulmon Subscribe to Product

liblouis liblouis 3.2.0

Vendor Advisories

Debian Bug report logs - #874302 liblouis: CVE-2017-13738 CVE-2017-13739 CVE-2017-13740 CVE-2017-13741 CVE-2017-13742 CVE-2017-13743 CVE-2017-13744 Package: src:liblouis; Maintainer for src:liblouis is Debian Accessibility Team <pkg-a11y-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg&g ...
Several security issues were fixed in Liblouis ...
There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 320, triggered in the function resolveSubtable() in compileTranslationTablec It will lead to denial of service or remote code execution ...