5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
39.7%
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the ‘–caprtl’ option, leading to a crash and causing a denial of service.
Vendor | Product | Version | CPE |
---|---|---|---|
fribidi | gnu_fribidi | * | cpe:2.3:a:fribidi:gnu_fribidi:*:*:*:*:*:*:*:* |
[
{
"product": "fribidi",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in v1.0.12"
}
]
}
]
More
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
39.7%