6.4
CVSSv2

CVE-2019-17544

Published: 14/10/2019 Updated: 02/08/2021
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

libaspell.a in GNU Aspell prior to 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu aspell

canonical ubuntu linux 19.04

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

Vendor Advisories

Aspell could be made to expose sensitive information if it received a specially crafted input ...
Aspell could be made to expose sensitive information if it received a specially crafted input ...
A buffer overflow was discovered in the Aspell spell checker, which could result in the execution of arbitrary code For the stable distribution (buster), these problems have been fixed in version 0607~20110707-6+deb10u1 We recommend that you upgrade your aspell packages For the detailed security status of aspell please refer to its security tr ...