CVE-2004-0548 Affecting aspell package, versions <0.50.5-3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-ASPELL-267383
  • published6 Aug 2004
  • disclosed6 Aug 2004

Introduced: 6 Aug 2004

CVE-2004-0548  (opens in a new tab)

How to fix?

Upgrade Debian:10 aspell to version 0.50.5-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream aspell package and not the aspell package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.

CVSS Scores

version 3.1