Vulnerability Description
The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Libcroco | 0.6.11 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
- https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behExploitPatchThird Party Advisory
- https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e9PatchThird Party Advisory
- https://security.gentoo.org/glsa/201707-13Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html
- https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behExploitPatchThird Party Advisory
- https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e9PatchThird Party Advisory
- https://security.gentoo.org/glsa/201707-13Third Party Advisory
FAQ
What is CVE-2017-7960?
CVE-2017-7960 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
How severe is CVE-2017-7960?
CVE-2017-7960 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7960?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Libcroco.