First published: Fri Jun 23 2023(Updated: )
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU LibreDWG | =0.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-36272 is high with a CVSS score of 8.8.
The vulnerability in LibreDWG v0.12.5 is a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
CVE-2023-36272 affects GNU LibreDWG version 0.12.5.
The heap buffer overflow vulnerability in LibreDWG v0.12.5 can be exploited by manipulating the bit_utf8_to_TU function in bits.c.
Currently, there is no available fix or patch for CVE-2023-36272. It is recommended to update to a newer version of LibreDWG when one becomes available.