Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-32181

Опубликовано: 01 июн. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.3

Описание

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 20%
0.00063
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
почти 3 года назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
nvd
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

CVSS3: 3.3
debian
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...

CVSS3: 3.3
github
больше 2 лет назад

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

suse-cvrf
больше 2 лет назад

Security update for libeconf

EPSS

Процентиль: 20%
0.00063
Низкий

3.3 Low

CVSS3

Уязвимость CVE-2023-32181