Lucene search

K
cveTalosCVE-2023-27390
HistoryJul 05, 2023 - 4:15 p.m.

CVE-2023-27390

2023-07-0516:15:09
CWE-787
CWE-122
talos
web.nvd.nist.gov
19
cve-2023-27390
heap-based buffer overflow
diagon v1.0.139
arbitrary code execution
nvd
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

29.9%

A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
diagon_projectdiagonMatch1.0.139
VendorProductVersionCPE
diagon_projectdiagon1.0.139cpe:2.3:a:diagon_project:diagon:1.0.139:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Diagon",
    "product": "Diagon",
    "versions": [
      {
        "version": "v1.0.139",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

29.9%