Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-22652

Опубликовано: 01 июн. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.3

Описание

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 25%
0.00087
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
около 3 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
nvd
почти 3 года назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
debian
почти 3 года назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...

CVSS3: 6.5
redos
около 2 месяцев назад

Уязвимость libeconf

CVSS3: 3.3
github
почти 3 года назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.

EPSS

Процентиль: 25%
0.00087
Низкий

3.3 Low

CVSS3