First published: Thu May 02 2024(Updated: )
An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead to arbitrary code execution.
Credit: cve@zscaler.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zscaler | ||
pacparser |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28798 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2023-28798, upgrade to the latest version of Zscaler Client Connector that addresses the vulnerability.
The implications of CVE-2023-28798 include potential unauthorized access and execution of malicious code on affected systems.
CVE-2023-28798 specifically affects the pacparser library within the Zscaler Client Connector on macOS.
No, CVE-2023-28798 specifically targets the macOS version of the Zscaler Client Connector and does not impact other operating systems.