
CVE-2020-12825 – libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c
https://notcve.org/view.php?id=CVE-2020-12825
12 May 2020 — libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption. libcroco versiones hasta 0.6.13, presenta una recursión excesiva en la función cr_parser_parse_any_core en el archivo cr-parser.c, conllevando a un consumo de la pila. A stack overflow flaw was found in libcroco. A service using libcroco's CSS parser could be crashed by a local, authenticated attacker, or an attacker utilizing social engineering, using a crafted input. The highest threat... • http://www.openwall.com/lists/oss-security/2020/08/13/3 • CWE-121: Stack-based Buffer Overflow CWE-674: Uncontrolled Recursion •

CVE-2017-8871 – libcroco 0.6.12 - Denial of Service
https://notcve.org/view.php?id=CVE-2017-8871
12 Jun 2017 — The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file. La función cr_parser_parse_selector_core en el archivo cr-parser.c en libcroco versión 0.6.12 permite a los atacantes remotos causar una denegación de servicio (bucle infinito y consumo de la CPU) por medio de un archivo CSS creado. • https://www.exploit-db.com/exploits/42147 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2017-8834 – Ubuntu Security Notice USN-5389-1
https://notcve.org/view.php?id=CVE-2017-8834
08 Jun 2017 — The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file. La función cr_tknzr_parse_comment en el archivo cr-tknzr.c en libcroco versión 0.6.12 permite a los atacantes remotos causar una denegación de servicio (error de asignación de memoria) por medio de un archivo CSS creado. It was discovered that Libcroco was incorrectly accessing data structures when reading bytes from memory, which could c... • https://packetstorm.news/files/id/142859 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-7960 – Ubuntu Security Notice USN-6958-1
https://notcve.org/view.php?id=CVE-2017-7960
19 Apr 2017 — The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file. La función cr_input_new_from_uri en cr-input.c en libcroco 0.6.11 y 0.6.12 permite a atacantes remotos provocar una denegación de servicio (sobre lectura de búfer basado en memoria dinámica) a través de un archivo CSS manipulado. It was discovered that Libcroco was incorrectly accessing data structures when reading bytes fro... • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html • CWE-125: Out-of-bounds Read •

CVE-2017-7961 – Gentoo Linux Security Advisory 201707-13
https://notcve.org/view.php?id=CVE-2017-7961
19 Apr 2017 — The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE: third-party analysis reports "This is not a security issue in my view. The conversion surely is truncating the double into a long value, but there is no impact as the value is one of the RGB... • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •