First published: Mon Nov 20 2023(Updated: )
wire-avs provides Audio, Visual, and Signaling (AVS) functionality sure the secure messaging software Wire. Prior to versions 9.2.22 and 9.3.5, a remote format string vulnerability could potentially allow an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 9.2.22 & 9.3.5 and is already included on all Wire products. No known workarounds are available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wire Audio\, Video\, And Signaling | <9.2.22 | |
Wire Audio\, Video\, And Signaling | >=9.3.0<=9.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48221 is a remote format string vulnerability in wire-avs, a secure messaging software that provides Audio, Visual, and Signaling (AVS) functionality.
The severity of CVE-2023-48221 is high, with a severity score of 8.8.
CVE-2023-48221 affects wire-avs versions up to 9.2.22 and versions between 9.3.0 and 9.3.5.
The impact of CVE-2023-48221 could potentially be a denial of service or the execution of arbitrary code.
To fix CVE-2023-48221, it is recommended to update wire-avs to versions 9.2.22 or 9.3.5.