Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-23462
HistoryOct 21, 2022 - 12:00 a.m.

CVE-2022-23462 Stack Buffer Overflow in iowow

2022-10-2100:00:00
CWE-121
CWE-120
GitHub_M
www.cve.org
stack buffer overflow
iowow
vulnerability
denial of service
json
patch
scientific notation

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

29.3%

IOWOW is a C utility library and persistent key/value storage engine. Versions 1.4.15 and prior contain a stack buffer overflow vulnerability that allows for Denial of Service (DOS) when it parses scientific notation numbers present in JSON. A patch for this issue is available at commit a79d31e4cff1d5a08f665574b29fd885897a28fd in the master branch of the repository. There are no workarounds other than applying the patch.

CNA Affected

[
  {
    "vendor": "Softmotions",
    "product": "iowow",
    "versions": [
      {
        "version": "1.4.15",
        "status": "affected",
        "lessThanOrEqual": "1.4.15",
        "versionType": "custom"
      }
    ]
  }
]

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

29.3%

Related for CVELIST:CVE-2022-23462