CVE-2018-11683
Published: 4 June 2018
Liblouis 3.5.0 has a stack-based Buffer Overflow in the function parseChars in compileTranslationTable.c, a different vulnerability than CVE-2018-11440.
Priority
Status
| Package | Release | Status |
|---|---|---|
|
liblouis Launchpad, Ubuntu, Debian |
artful |
Released
(3.0.0-3ubuntu1.2)
|
| bionic |
Released
(3.5.0-1ubuntu0.2)
|
|
| trusty |
Released
(2.5.3-2ubuntu1.4)
|
|
| upstream |
Released
(3.5.0-3)
|
|
| xenial |
Released
(2.6.4-2ubuntu0.3)
|
|
|
Patches: other: https://github.com/liblouis/liblouis/commit/e7eee2b7926668360a0d8e2abee6c35a00ebce3c other: https://github.com/liblouis/liblouis/commit/d4fc803687e38a5355fb686bf98cc082951f3043 |
||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 8.8 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |