6.8
CVSSv2

CVE-2018-11440

Published: 25/05/2018 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c.

Vulnerable Product Search on Vulmon Subscribe to Product

liblouis liblouis 3.5.0

canonical ubuntu linux 16.04

canonical ubuntu linux 17.10

canonical ubuntu linux 18.04

canonical ubuntu linux 14.04

opensuse leap 15.0

Vendor Advisories

Several security issues were fixed in Liblouis ...
Debian Bug report logs - #900085 liblouis: CVE-2018-11440: stack-based buffer overflow in compileTranslationTablec parseChars Package: src:liblouis; Maintainer for src:liblouis is Debian Accessibility Team <pkg-a11y-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 25 Ma ...
Debian Bug report logs - #901202 liblouis: CVE-2018-12085: stack-based buffer overflow compileTranslationTablec in 1130 in parseChars Package: src:liblouis; Maintainer for src:liblouis is Debian Accessibility Team <pkg-a11y-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Su ...
Liblouis 350 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTablec ...