Vulnerabilities > CVE-2023-22652 - Unspecified vulnerability in Opensuse Libeconf 0.5.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
References
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22652
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22652
- https://https://github.com/openSUSE/libeconf/issues/177
- https://https://github.com/openSUSE/libeconf/issues/177
- https://lists.fedoraproject.org/archives/list/[email protected]/message/SDD5GL5T3V5XZ3VFA4HPE6YGJ2K4HHPC/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/SDD5GL5T3V5XZ3VFA4HPE6YGJ2K4HHPC/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/YAYW7X753Z6GOJKVLQPXBDHISN6ZT233/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/YAYW7X753Z6GOJKVLQPXBDHISN6ZT233/