Description
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
References (4)
Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/fribidi/fribidi/issues/182
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2047896
Patch, Third Party Advisory x_refsource_misc
https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2022-25309
Scores
CVSS v3
5.5
EPSS
0.0004
EPSS Percentile
12.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-122
CWE-787
Status
published
Products (3)
gnu/fribidi
< 1.0.12
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
Published
Sep 06, 2022
Tracked Since
Feb 18, 2026