Vulnerability Description
libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution. This issue is patched in version 2.3.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lipnitsk | Libcue | < 2.3.0 |
| Fedoraproject | Fedora | 37 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.ht
- https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2ExploitThird Party Advisory
- https://github.com/lipnitsk/libcue/commit/cfb98a060fd79dbc3463d85f0f29c3c335dfa0Patch
- https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a92Patch
- https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cjExploit
- https://lists.debian.org/debian-lts-announce/2023/10/msg00018.htmlMailing List
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://www.debian.org/security/2023/dsa-5524Third Party Advisory
- http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.ht
- https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2ExploitThird Party Advisory
- https://github.com/lipnitsk/libcue/commit/cfb98a060fd79dbc3463d85f0f29c3c335dfa0Patch
- https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a92Patch
- https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cjExploit
FAQ
What is CVE-2023-43641?
CVE-2023-43641 is a vulnerability with a CVSS score of 8.8 (HIGH). libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited ...
How severe is CVE-2023-43641?
CVE-2023-43641 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-43641?
Check the references section above for vendor advisories and patch information. Affected products include: Lipnitsk Libcue, Fedoraproject Fedora, Debian Debian Linux.