First published: Tue Aug 15 2023(Updated: )
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the unicode_decode_wcstombs function in xlstool.c:266.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libxls Project Libxls | =1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38852.
The severity of CVE-2023-38852 is medium.
The vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code by exploiting the buffer overflow vulnerability in the unicode_decode_wcstombs function in xlstool.c:266.
An attacker can cause a denial of service by sending a crafted XLS file to the unicode_decode_wcstombs function in xlstool.c:266, triggering the buffer overflow vulnerability in libxlsv.1.6.2.
Yes, it is recommended to update to a version of libxlsv that is not affected by the vulnerability. Please refer to the vendor's website or official sources for the patch or update.