Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-22652

Опубликовано: 01 июн. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.3

Описание

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 21%
0.00068
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
nvd
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
debian
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...

CVSS3: 3.3
github
около 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

oracle-oval
около 2 лет назад

ELSA-2023-4347: libeconf security update (MODERATE)

EPSS

Процентиль: 21%
0.00068
Низкий

3.3 Low

CVSS3