Lucene search

K
nvd[email protected]NVD:CVE-2023-27390
HistoryJul 05, 2023 - 4:15 p.m.

CVE-2023-27390

2023-07-0516:15:09
CWE-122
CWE-787
web.nvd.nist.gov
3
cve-2023-27390
sequence::drawtext
arbitrary code execution
markdown file
malicious file

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

29.9%

A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.

Affected configurations

Nvd
Node
diagon_projectdiagonMatch1.0.139
VendorProductVersionCPE
diagon_projectdiagon1.0.139cpe:2.3:a:diagon_project:diagon:1.0.139:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

29.9%