Lucene search

K
cvelistSuseCVELIST:CVE-2023-32181
HistoryJun 01, 2023 - 11:46 a.m.

CVE-2023-32181 Stack buffer overflow in "econf_writeFile" function

2023-06-0111:46:03
CWE-120
suse
www.cve.org
4
buffer overflow
opensuse
libeconf
dos
configuration files
vulnerability

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

32.1%

A Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.

CNA Affected

[
  {
    "collectionURL": "https://github.com/openSUSE/libeconf",
    "defaultStatus": "unaffected",
    "product": "libeconf",
    "vendor": "openSUSE",
    "versions": [
      {
        "lessThan": "0.5.2",
        "status": "affected",
        "version": "?",
        "versionType": "0.5.2"
      }
    ]
  }
]

CVSS3

3.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

32.1%