2 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. Una vulnerabilidad de Copia del Búfer de memoria Sin Comprobar el Tamaño de Entrada ('Desbordamiento de Búfer Clásico') en openSUSE libeconf conduce a una denegación de servicio (DoS) a través de archivos de configuración con formato malformado. Este problema afecta a libeconf: antes de la versión 0.5.2. A flaw was found in the libeconf library. This issue occurs when parsing a specially crafted configuration file, causing a stack-based buffer overflow, resulting in a denial of service. • https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-22652 https://https://github.com/openSUSE/libeconf/issues/177 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDD5GL5T3V5XZ3VFA4HPE6YGJ2K4HHPC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG5256D5I3GFA3RBAJQ2WYPJDYAIL74 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAYW7X753Z6GOJKVLQPXBDHISN6ZT233 https://access.redhat.com/security/cve/CVE-2023 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2. • https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 https://https://github.com/openSUSE/libeconf/issues/178 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •