A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.
References
Link | Resource |
---|---|
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | Broken Link Issue Tracking Vendor Advisory |
https://https://github.com/openSUSE/libeconf/issues/178 | Broken Link Issue Tracking Vendor Advisory |
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | Broken Link Issue Tracking Vendor Advisory |
https://https://github.com/openSUSE/libeconf/issues/178 | Broken Link Issue Tracking Vendor Advisory |
https://github.com/openSUSE/libeconf/issues/178 |
Configurations
History
10 Jan 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
References | () https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 - Broken Link, Issue Tracking, Vendor Advisory | |
References | () https://https://github.com/openSUSE/libeconf/issues/178 - Broken Link, Issue Tracking, Vendor Advisory |
08 Jun 2023, 18:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:opensuse:libeconf:*:*:*:*:*:*:*:* | |
References | (MISC) https://https://github.com/openSUSE/libeconf/issues/178 - Broken Link, Issue Tracking, Vendor Advisory | |
References | (MISC) https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 - Broken Link, Issue Tracking, Vendor Advisory |
01 Jun 2023, 13:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 12:15
Updated : 2025-01-10 19:15
NVD link : CVE-2023-32181
Mitre link : CVE-2023-32181
CVE.ORG link : CVE-2023-32181
JSON object : View
Products Affected
opensuse
- libeconf
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')