A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c.
References
Link | Resource |
---|---|
https://github.com/LibreDWG/libredwg/issues/615 | Exploit Vendor Advisory |
https://github.com/LibreDWG/libredwg/issues/615 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LibreDWG/libredwg/issues/615 - Exploit, Vendor Advisory |
10 Mar 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-787 | |
References | (MISC) https://github.com/LibreDWG/libredwg/issues/615 - Exploit, Vendor Advisory |
01 Mar 2023, 16:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-01 15:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25222
Mitre link : CVE-2023-25222
CVE.ORG link : CVE-2023-25222
JSON object : View
Products Affected
gnu
- libredwg
CWE
CWE-787
Out-of-bounds Write