First published: Thu Dec 14 2023(Updated: )
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functions and improper bounds checking. A malicious game streaming server could exploit a buffer overflow vulnerability to crash a moonlight client, or achieve remote code execution (RCE) on the client (with insufficient exploit mitigations or if mitigations can be bypassed). The bug was addressed in commit 24750d4b748fefa03d09fcfd6d45056faca354e0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moonlight Stream | >=2022-11-04<2023-10-06 | |
Moonlight | >=8.4.0<=8.5.0 | |
Moonlight | >=8.4.0<=8.5.0 | |
Moonlight | >=10.10<=11.0 | |
Moonlight | =0.10.22 | |
Moonlight | =2.6.0 | |
Moonlight | >=1.12.0<=1.14.40 | |
Moonlight Stream | >=1.5.4<=1.5.27 | |
Moonlight | >=0.13<=0.13.3 | |
Moonlight | >=0.9.2<=0.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42800 is classified as a critical vulnerability due to the potential for a buffer overflow.
To fix CVE-2023-42800, update to the latest version of Moonlight-common-c that addresses this buffer overflow issue.
CVE-2023-42800 affects various versions of Moonlight and Moonlight-common-c across multiple platforms including mobile and embedded systems.
Exploiting CVE-2023-42800 could allow attackers to execute arbitrary code remotely, compromising the affected system.
CVE-2023-42800 was introduced in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9.