Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-30078

Опубликовано: 22 авг. 2023
Источник: ubuntu
Приоритет: medium

Описание

Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

0.5.2+dfsg1-1
esm-apps/jammy

not-affected

esm-infra/focal

DNE

focal

DNE

jammy

not-affected

lunar

ignored

end of life, was needs-triage
mantic

not-affected

0.5.2+dfsg1-1
trusty

ignored

end of standard support
upstream

released

0.5.2+dfsg1-1

Показывать по

Связанные уязвимости

CVSS3: 8.8
redhat
больше 2 лет назад

A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow that results in a denial of service.

nvd
больше 2 лет назад

Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

CVSS3: 8.8
github
больше 2 лет назад

A stack overflow vulnerability exists in function econf_writeFile in file atlibeconf/lib/libeconf.c in libeconf 0.5.1 allows attackers to cause a Denial of service or execute arbitrary code.

CVSS3: 8.8
fstec
почти 3 года назад

Уязвимость функции econf_writeFile() библиотеки для анализа и управления файлами конфигурации libeconf, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

suse-cvrf
больше 2 лет назад

Security update for libeconf

Уязвимость CVE-2023-30078