Vulnerability Description
The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Libcroco | 0.6.12 |
| Opensuse | Leap | 42.3 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/08/13/3ExploitMailing ListThird Party Advisory
- https://bugzilla.gnome.org/show_bug.cgi?id=782647Issue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/42147/ExploitThird Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2020/08/13/3ExploitMailing ListThird Party Advisory
- https://bugzilla.gnome.org/show_bug.cgi?id=782647Issue TrackingThird Party Advisory
- https://www.exploit-db.com/exploits/42147/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-8834?
CVE-2017-8834 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
How severe is CVE-2017-8834?
CVE-2017-8834 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8834?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Libcroco, Opensuse Leap.