Vulnerability Description
Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Cflow | 1.6 |
| Fedoraproject | Fedora | 33 |
Related Weaknesses (CWE)
References
- https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.htmlExploitMailing ListVendor Advisory
- https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284ExploitThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.htmlExploitMailing ListVendor Advisory
FAQ
What is CVE-2020-23856?
CVE-2020-23856 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
How severe is CVE-2020-23856?
CVE-2020-23856 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-23856?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Cflow, Fedoraproject Fedora.