First published: Thu Jun 01 2023(Updated: )
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE libeconf | <0.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-32181.
The severity of CVE-2023-32181 is medium (6.5).
The openSUSE libeconf software version up to and excluding 0.5.2 is affected by this vulnerability.
This vulnerability allows for a Denial-of-Service (DoS) attack through malformed configuration files.
You can find more information about CVE-2023-32181 at the following references: (1) https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181, (2) https://github.com/openSUSE/libeconf/issues/178