Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-22652

Опубликовано: 16 мар. 2023
Источник: redhat
CVSS3: 6.5

Описание

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow, resulting in a denial of service.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2212463libeconf: stack-based buffer overflow in read_file() in lib/getfilecontents.c

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
nvd
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
debian
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...

CVSS3: 3.3
github
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

oracle-oval
около 2 лет назад

ELSA-2023-4347: libeconf security update (MODERATE)

6.5 Medium

CVSS3