First published: Wed Dec 20 2023(Updated: )
A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the sms_decode_address_field() function during the SMS PDU decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ofono | <2.1 | 2.1 |
debian/ofono | <=1.31-3 | 2.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4233 has been classified as a critical vulnerability due to the potential for remote code execution stemming from a stack overflow condition.
To remediate CVE-2023-4233, update to ofono version 2.1 or later for Red Hat systems, or version 2.12-1 or later for Debian systems.
CVE-2023-4233 affects users running ofono versions prior to 2.1 on Red Hat and versions up to 1.31-3 on Debian.
CVE-2023-4233 can be exploited via a compromised modem or a malicious base station targeting the SMS PDU decoding process.
Yes, CVE-2023-4233 poses significant risks as it allows remote code execution, making it imperative to address immediately.