CVE-2019-18397

HIGH

GNU Fribidi < 1.0.7 - Buffer Overflow

Title source: rule
STIX 2.1

Description

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

References (10)

Core 10
Core References
Third Party Advisory x_refsource_misc
https://marc.info/?l=oss-security&m=157322128105807&w=2
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944327
Third Party Advisory x_refsource_misc
https://security-tracker.debian.org/tracker/CVE-2019-18397
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4326
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:4361
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2020:0291
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202003-41

Scores

CVSS v3 7.8
EPSS 0.0068
EPSS Percentile 71.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (4)
debian/debian_linux 10.0
debian/debian_linux 8.0
debian/debian_linux 9.0
gnu/fribidi 1.0.0 - 1.0.7
Published Nov 13, 2019
Tracked Since Feb 18, 2026