First published: Tue Aug 22 2023(Updated: )
A stack overflow vulnerability exists in function read_file in atlibeconf/lib/getfilecontents.c in libeconf 0.5.1 allows attackers to cause a Denial of service or execute arbitrary code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE libeconf | =0.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-30079 is high, with a severity value of 8.8.
CVE-2023-30079 affects libeconf version 0.5.1 on openSUSE.
CVE-2023-30079 can result in a denial of service or allow attackers to execute arbitrary code.
To fix CVE-2023-30079, it is recommended to update libeconf to a version that is not affected by the vulnerability.
You can find more information about CVE-2023-30079 on the following references: [link 1](https://github.com/openSUSE/libeconf/issues/177), [link 2](https://github.com/yangjiageng/PoC/blob/master/libeconf-PoC/read_file_503), [link 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDD5GL5T3V5XZ3VFA4HPE6YGJ2K4HHPC/)