Gnu Aspell vulnerabilities
4 known vulnerabilities affecting gnu/aspell.
Total CVEs
4
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2
Vulnerabilities
Page 1 of 1
CVE-2019-25051HIGHCVSS 7.8v0.60.82021-07-20
CVE-2019-25051 [HIGH] CWE-787 CVE-2019-25051: objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).
nvd
CVE-2019-20433CRITICALCVSS 9.1fixed in 0.60.82020-01-27
CVE-2019-20433 [CRITICAL] CWE-125 CVE-2019-20433: libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0
libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.
nvd
CVE-2019-17544CRITICALCVSS 9.1fixed in 0.60.82019-10-14
CVE-2019-17544 [CRITICAL] CWE-125 CVE-2019-17544: libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in c
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.
nvd
CVE-2004-0548HIGHCVSS 7.2PoCv0.50.52004-08-06
CVE-2004-0548 [HIGH] CVE-2004-0548: Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspe
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
nvd