A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.
References
Link | Resource |
---|---|
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | Broken Link Issue Tracking Vendor Advisory |
https://https://github.com/openSUSE/libeconf/issues/178 | Broken Link Issue Tracking Vendor Advisory |
Configurations
History
08 Jun 2023, 18:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:opensuse:libeconf:*:*:*:*:*:*:*:* | |
References | (MISC) https://https://github.com/openSUSE/libeconf/issues/178 - Broken Link, Issue Tracking, Vendor Advisory | |
References | (MISC) https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 - Broken Link, Issue Tracking, Vendor Advisory |
01 Jun 2023, 13:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 12:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-32181
Mitre link : CVE-2023-32181
CVE.ORG link : CVE-2023-32181
JSON object : View
Products Affected
opensuse
- libeconf
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')