Vulnerability Description
libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Aspell | < 0.60.8 |
Related Weaknesses (CWE)
References
- http://aspell.net/buffer-overread-ucs.txtVendor Advisory
- http://aspell.net/buffer-overread-ucs.txtVendor Advisory
FAQ
What is CVE-2019-20433?
CVE-2019-20433 is a vulnerability with a CVSS score of 9.1 (CRITICAL). libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ...
How severe is CVE-2019-20433?
CVE-2019-20433 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-20433?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Aspell.