6.5
CVSSv3

CVE-2018-17294

Published: 21/09/2018 Updated: 18/04/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The matchCurrentInput function inside lou_translateString.c of Liblouis before 3.7 does not check the input string's length, allowing malicious users to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

liblouis liblouis

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

opensuse leap 15.0

Vendor Advisories

Several security issues were fixed in Liblouis ...
The matchCurrentInput function inside lou_translateStringc of Liblouis prior to 37 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries ...