Lucene search

K
cve[email protected]CVE-2023-42800
HistoryDec 14, 2023 - 5:15 p.m.

CVE-2023-42800

2023-12-1417:15:07
CWE-120
web.nvd.nist.gov
24
cve-2023-42800
moonlight
buffer overflow
gamestream
rce
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functions and improper bounds checking. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client, or achieve remote code execution (RCE) on the client (with insufficient exploit mitigations or if mitigations can be bypassed). The bug was addressed in commit 24750d4b748fefa03d09fcfd6d45056faca354e0.

CPE configuration

Vulners
NVD
moonlight-streammoonlight-common-cRange50c0a51b10ecc5b3415ea78c21d96d679e2288f924750d4b748fefa03d09fcfd6d45056faca354e0
VendorProductVersionCPE
moonlight\-streammoonlight\-common\-c*cpe:2.3:a:moonlight\-stream:moonlight\-common\-c:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "moonlight-stream",
    "product": "moonlight-common-c",
    "versions": [
      {
        "version": ">= 50c0a51b10ecc5b3415ea78c21d96d679e2288f9, < 24750d4b748fefa03d09fcfd6d45056faca354e0",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

Related for CVE-2023-42800