CVE-2019-20433

Severity
9.1CRITICAL
EPSS
0.6%
top 29.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 27
Latest updateMay 24

Description

libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

NVDgnu/aspell< 0.60.8
Debianaspell< 0.60.7-3+3

🔴Vulnerability Details

3
GHSA
GHSA-qcm5-23xv-7r79: libaspell2022-05-24
OSV
CVE-2019-20433: libaspell2020-01-27
CVEList
CVE-2019-20433: libaspell2020-01-27

📋Vendor Advisories

2
Red Hat
aspell: UCS-2 and UCS-4 null-terminated string handling OOB read2019-08-17
Debian
CVE-2019-20433: aspell - libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string endi...2019

💬Community

1
Bugzilla
CVE-2019-20433 aspell: UCS-2 and UCS-4 null-terminated string handling OOB read2019-10-22
CVE-2019-20433 (CRITICAL CVSS 9.1) | libaspell.a in GNU Aspell before 0. | cvebase.io