CVE-2019-18397

Current Description

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

Basic Data

PublishedNovember 13, 2019
Last ModifiedDecember 18, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-120
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuFribidi********1.0.01.0.7
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux10*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux8.0*******
    2.3OSDebianDebian Linux9.0*******
    2.3OSDebianDebian Linux10*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 10, 8.0, 9.0
Gnu Fribidi *

References

NameSourceURLTags
RHSA-2019:4326https://access.redhat.com/errata/RHSA-2019:4326REDHAT
RHSA-2019:4361https://access.redhat.com/errata/RHSA-2019:4361REDHAT
RHSA-2020:0291https://access.redhat.com/errata/RHSA-2020:0291REDHAT
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944327https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944327CONFIRMIssue Tracking Third Party Advisory
https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568MISCPatch
FEDORA-2019-533a72fec5https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFS3NFEDORA
FEDORA-2019-7075bc4ff8https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5UJRFEDORA
https://marc.info/?l=oss-security&m=157322128105807&w=2https://marc.info/?l=oss-security&m=157322128105807&w=2MISCThird Party Advisory
GLSA-202003-41https://security.gentoo.org/glsa/202003-41GENTOO
https://security-tracker.debian.org/tracker/CVE-2019-18397https://security-tracker.debian.org/tracker/CVE-2019-18397MISCThird Party Advisory