Vulnerability Description
A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Editorconfig | Editorconfig | < 0.12.6 |
Related Weaknesses (CWE)
References
- https://github.com/editorconfig/editorconfig-core-c/commit/41281ea82fbf24b060a9fPatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://litios.github.io/2023/01/14/CVE-2023-0341.htmlExploitPatchThird Party Advisory
- https://ubuntu.com/security/notices/USN-5842-1
- https://github.com/editorconfig/editorconfig-core-c/commit/41281ea82fbf24b060a9fPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/11/msg00036.html
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://litios.github.io/2023/01/14/CVE-2023-0341.htmlExploitPatchThird Party Advisory
- https://ubuntu.com/security/notices/USN-5842-1
FAQ
What is CVE-2023-0341?
CVE-2023-0341 is a vulnerability with a CVSS score of 7.8 (HIGH). A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. edit...
How severe is CVE-2023-0341?
CVE-2023-0341 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0341?
Check the references section above for vendor advisories and patch information. Affected products include: Editorconfig Editorconfig.