CVE-2022-25309

MEDIUM

GNU Fribidi < 1.0.12 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

References (4)

Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/fribidi/fribidi/issues/182
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2047896
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2022-25309

Scores

CVSS v3 5.5
EPSS 0.0004
EPSS Percentile 12.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-122 CWE-787
Status published
Products (3)
gnu/fribidi < 1.0.12
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
Published Sep 06, 2022
Tracked Since Feb 18, 2026