The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/liblouis/liblouis/issues/635 | exploit third party advisory patch |
https://usn.ubuntu.com/3782-1/ | third party advisory vendor advisory |
http://www.securityfocus.com/bid/105511 | vdb entry third party advisory |
https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e | third party advisory patch |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00038.html | third party advisory vendor advisory |