First published: Sat Jul 06 2019(Updated: )
Codedoc v3.2 has a stack-based buffer overflow in add_variable in codedoc.c, related to codedoc_strlcpy.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Codedoc | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13362 is classified as high severity due to its potential for exploitation via a stack-based buffer overflow.
To fix CVE-2019-13362, you should update Codedoc to version 3.3 or later, which addresses the vulnerability.
The risks associated with CVE-2019-13362 include possible remote code execution and system crashes due to the buffer overflow.
CVE-2019-13362 affects Codedoc version 3.2.
Yes, CVE-2019-13362 can potentially be exploited remotely by an attacker leveraging the stack-based buffer overflow.