Lucene search

K
cve[email protected]CVE-2023-42799
HistoryDec 14, 2023 - 5:15 p.m.

CVE-2023-42799

2023-12-1417:15:07
CWE-120
web.nvd.nist.gov
26
moonlight-common-c
buffer overflow
rce
gamestream client
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functions and improper bounds checking. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client, or achieve remote code execution (RCE) on the client (with insufficient exploit mitigations or if mitigations can be bypassed). The bug was addressed in commit 02b7742f4d19631024bd766bd2bb76715780004e.

CPE configuration

Vulners
NVD
moonlight-streammoonlight-common-cRange50c0a51b10ecc5b3415ea78c21d96d679e2288f902b7742f4d19631024bd766bd2bb76715780004e
VendorProductVersionCPE
moonlight\-streammoonlight\-common\-c*cpe:2.3:a:moonlight\-stream:moonlight\-common\-c:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "moonlight-stream",
    "product": "moonlight-common-c",
    "versions": [
      {
        "version": ">= 50c0a51b10ecc5b3415ea78c21d96d679e2288f9, < 02b7742f4d19631024bd766bd2bb76715780004e",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

Related for CVE-2023-42799