A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.
References
Link | Resource |
---|---|
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | Broken Link Issue Tracking Vendor Advisory |
https://https://github.com/openSUSE/libeconf/issues/178 | Broken Link Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-06-01 12:15
Updated : 2023-06-08 18:29
NVD link : CVE-2023-32181
Mitre link : CVE-2023-32181
CVE.ORG link : CVE-2023-32181
JSON object : View
Products Affected
opensuse
- libeconf
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')