First published: Thu Jun 01 2023(Updated: )
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2.
Credit: meissner@suse.de meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE libeconf | <0.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22652 is a Buffer Copy without Checking Size of Input (Classic Buffer Overflow) vulnerability in openSUSE libeconf that leads to a DoS via malformed config files.
CVE-2023-22652 affects openSUSE libeconf versions before 0.5.2.
The severity of CVE-2023-22652 is medium, with a severity value of 6.5.
CVE-2023-22652 can be exploited by using malformed config files to trigger a buffer overflow.
Yes, a fix is available for CVE-2023-22652 by updating to openSUSE libeconf version 0.5.2 or later.