First published: Tue Aug 15 2023(Updated: )
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the get_string function in xlstool.c:411.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libxls Project Libxls | =1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38856.
The severity rating of CVE-2023-38856 is medium (6.5).
A remote attacker can exploit CVE-2023-38856 by sending a crafted XLS file to the get_string function in xlstool.c:411, which can lead to the execution of arbitrary code and a denial of service.
Yes, a fix is available for CVE-2023-38856. It is recommended to update to the latest version of libxlsv (1.6.2) to address the vulnerability.
You can find more information about CVE-2023-38856 at the following reference link: [https://github.com/libxls/libxls/issues/124](https://github.com/libxls/libxls/issues/124)