Vulnerability Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Libeconf | < 0.5.2 |
Related Weaknesses (CWE)
References
- https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181Broken LinkIssue TrackingVendor Advisory
- https://https://github.com/openSUSE/libeconf/issues/178Broken LinkIssue TrackingVendor Advisory
- https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181Broken LinkIssue TrackingVendor Advisory
- https://https://github.com/openSUSE/libeconf/issues/178Broken LinkIssue TrackingVendor Advisory
- https://github.com/openSUSE/libeconf/issues/178
FAQ
What is CVE-2023-32181?
CVE-2023-32181 is a vulnerability with a CVSS score of 3.3 (LOW). A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2. ...
How severe is CVE-2023-32181?
CVE-2023-32181 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32181?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Libeconf.