cve/2022/CVE-2022-25309.md

18 lines
876 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25309)
![](https://img.shields.io/static/v1?label=Product&message=fribidi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Fixed%20in%20v1.0.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20-%20Heap-based%20Buffer%20Overflow.&color=brighgreen)
### Description
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
### POC
#### Reference
- https://github.com/fribidi/fribidi/issues/182
#### Github
- https://github.com/ARPSyndicate/cvemon