First published: Thu Dec 14 2023(Updated: )
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functions and improper bounds checking. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client, or achieve remote code execution (RCE) on the client (with insufficient exploit mitigations or if mitigations can be bypassed). The bug was addressed in commit 02b7742f4d19631024bd766bd2bb76715780004e.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moonlight Stream | >=2022-11-04<2023-10-06 | |
Moonlight | >=8.4.0<=8.5.0 | |
Moonlight | >=8.4.0<=8.5.0 | |
Moonlight | >=10.10<=11.0 | |
Moonlight | =0.10.22 | |
Moonlight | =2.6.0 | |
Moonlight | >=1.12.0<=1.14.40 | |
Moonlight Stream | >=1.5.4<=1.5.27 | |
Moonlight | >=0.13<=0.13.3 | |
Moonlight | >=0.9.2<=0.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42799 is considered a high severity vulnerability due to its potential to cause a buffer overflow.
To fix CVE-2023-42799, users must update to the patched version of moonlight-common-c or the affected Moonlight applications.
CVE-2023-42799 is a buffer overflow vulnerability stemming from unsafe C function usage and improper bounds checking.
CVE-2023-42799 affects various Moonlight applications, including moonlight-common-c and specific versions of the Moonlight client for iOS, Android, and others.
CVE-2023-42799 was introduced starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9.