netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.facebook.com/security/advisories/cve-2023-28753 | patch vendor advisory |
https://github.com/facebook/netconsd/commit/9fc54edf54f7caea1189c2b979337ed37af2c60e | patch |