
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was discovered in Espeak-ng version 1.52-dev, identified as CVE-2023-49990. The vulnerability exists in the SetUpPhonemeTable function within the synthdata.c file. This security flaw affects the text-to-speech program that supports over 70 languages (NVD, Ubuntu).
The vulnerability is classified as a global buffer overflow issue that occurs when accessing memory 140 bytes to the right of the global variable 'phoneme_tab_list' defined in synthdata.c. The CVSS v3.1 base score is 5.3 (Medium), with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L. This indicates a local attack vector with low attack complexity, requiring no privileges but user interaction, and potentially impacting confidentiality, integrity, and availability at a low level (GitHub Issue, NVD).
The buffer overflow vulnerability can lead to potential system compromise with low-level impacts on confidentiality, integrity, and availability. The vulnerability requires local access and user interaction to be exploited, which somewhat limits its potential impact (NVD).
Multiple Linux distributions have released patches to address this vulnerability. Ubuntu has released fixes for various versions including 23.10 (mantic), 22.04 LTS (jammy), and 20.04 LTS (focal). Fedora has also released security updates for versions 38 and 39 with the package espeak-ng-1.51.1-6. Users are advised to update to the latest patched versions (Ubuntu, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."