Description
The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
References (4)
Core 4
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201707-13
Patch, Third Party Advisory x_refsource_misc
https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
Exploit, Patch, Third Party Advisory x_refsource_misc
https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
Scores
CVSS v3
5.5
EPSS
0.0039
EPSS Percentile
60.4%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (2)
gnome/libcroco
0.6.11
gnome/libcroco
0.6.12
Published
Apr 19, 2017
Tracked Since
Feb 18, 2026