Vulnerability Description
There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between the original ClientHello and the second ClientHello, crashing the process (impact is limited to denial of service).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fizz | < 2023.01.30.00 |
Related Weaknesses (CWE)
References
- https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebadPatch
- https://www.facebook.com/security/advisories/cve-2023-23759PatchVendor Advisory
- https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebadPatch
- https://www.facebook.com/security/advisories/cve-2023-23759PatchVendor Advisory
FAQ
What is CVE-2023-23759?
CVE-2023-23759 is a vulnerability with a CVSS score of 7.5 (HIGH). There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between ...
How severe is CVE-2023-23759?
CVE-2023-23759 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23759?
Check the references section above for vendor advisories and patch information. Affected products include: Facebook Fizz.