Vulnerability Description
Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and before allows a local attacker to execute arbitrary code via a crafted .exe, .sys, and .dll files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Osslsigncode Project | Osslsigncode | 2.3 |
Related Weaknesses (CWE)
References
- https://github.com/mtrojnar/osslsigncode/compare/2.2...2.3Release Notes
- https://github.com/mtrojnar/osslsigncode/releases/tag/2.3Release Notes
- https://lists.debian.org/debian-lts-announce/2023/12/msg00016.html
- https://github.com/mtrojnar/osslsigncode/compare/2.2...2.3Release Notes
- https://github.com/mtrojnar/osslsigncode/releases/tag/2.3Release Notes
- https://lists.debian.org/debian-lts-announce/2023/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2025/12/msg00037.html
FAQ
What is CVE-2023-36377?
CVE-2023-36377 is a vulnerability with a CVSS score of 7.8 (HIGH). Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and before allows a local attacker to execute arbitrary code via a crafted .exe, .sys, and .dll files.
How severe is CVE-2023-36377?
CVE-2023-36377 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36377?
Check the references section above for vendor advisories and patch information. Affected products include: Osslsigncode Project Osslsigncode.