A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181 | vendor advisory broken link issue tracking |
https://https://github.com/openSUSE/libeconf/issues/178 | vendor advisory broken link issue tracking |
https://github.com/openSUSE/libeconf/issues/178 |