Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-5023-1 (CVE-2019-25051): Aspell vulnerability

Back to Search

Ubuntu: USN-5023-1 (CVE-2019-25051): Aspell vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
07/20/2021
Created
07/29/2021
Added
07/27/2021
Modified
08/04/2021

Description

objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).

Solution(s)

  • ubuntu-upgrade-0-60-7-20110707-1ubuntu1-esm2
  • ubuntu-upgrade-0-60-7-20110707-3ubuntu0-1-esm1
  • ubuntu-upgrade-aspell
  • ubuntu-upgrade-available
  • ubuntu-upgrade-desktop
  • ubuntu-upgrade-infra
  • ubuntu-upgrade-libaspell15
  • ubuntu-upgrade-ua

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;