There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between the original ClientHello and the second ClientHello, crashing the process (impact is limited to denial of service).
References
Link | Resource |
---|---|
https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebad0eb215265 | Patch |
https://www.facebook.com/security/advisories/cve-2023-23759 | Patch Vendor Advisory |
Configurations
History
27 May 2023, 00:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:facebook:fizz:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-617 | |
References | (MISC) https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebad0eb215265 - Patch | |
References | (MISC) https://www.facebook.com/security/advisories/cve-2023-23759 - Patch, Vendor Advisory |
18 May 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-18 22:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-23759
Mitre link : CVE-2023-23759
CVE.ORG link : CVE-2023-23759
JSON object : View
Products Affected
- fizz
CWE
CWE-617
Reachable Assertion