Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-39742: Notify CVE about a publication

giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.

CVE
#vulnerability#dos#git#buffer_overflow

Notify CVE about a publication

[CVE ID]

CVE-2023-39741

[Vulnerability Type]

> Buffer Overflow

>

> ------------------------------------------

>

> [Vendor of Product]

> the development group

>

> ------------------------------------------

>

> [Affected Product Code Base]

> lrzip - 0.651

>

> ------------------------------------------

>

> [Affected Component]

> lrzip 0.651

>

> ------------------------------------------

>

> [Impact Denial of Service]

> true

>

> ------------------------------------------

>

> [Attack Vectors]

> a crafted file

> [Suggested description]

>lrzip v0.651 was discovered to contain a heap overflow via the libzpaq::PostProcessor::write(int) function at /libzpaq/libzpaq.cpp.

This vulnerability allows attackers to cause a Denial of Service (DoS)> via a crafted file.

>[CVE ID]

>CVE-2023-39742

> ------------------------------------------

>

> [Vulnerability Type]

> Buffer Overflow

>

> ------------------------------------------

>

> [Vendor of Product]

> the development group

>

> ------------------------------------------

>

> [Affected Product Code Base]

> giflib - 5.2.1

>

> ------------------------------------------

>

> [Affected Component]

> giflib

>

> ------------------------------------------

>

> [Attack Type]

> Local

>

> ------------------------------------------

>

> [Impact Denial of Service]

> true

>

> ------------------------------------------

>

> [Attack Vectors]

> invalid args

>

> ------------------------------------------

>

> [Reference]

> https://sourceforge.net/p/giflib/bugs/166/

>

> ------------------------------------------

> [Suggested description]

> giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.

>

[CVE ID]

CVE-2023-39743

> ------------------------------------------

>

> [VulnerabilityType Other]

> Access Violation

>

> ------------------------------------------

>

> [Vendor of Product]

> the development group

>

> ------------------------------------------

>

> [Affected Product Code Base]

> lrzip-next - LZMA 23.01

>

> ------------------------------------------

>

> [Affected Component]

> lrzip-next

>

> ------------------------------------------

>

> [Impact Denial of Service]

> true

>

> ------------------------------------------

>

> [Attack Vectors]

> a crafted lrz file

>

> ------------------------------------------

>

> [Reference]

> https://github.com/huanglei3/lrzip-next-poc/tree/main

> https://github.com/pete4abw/lrzip-next/issues/132

>

> ------------------------------------------

> [Suggested description]

> lrzip-next LZMA v23.01 was discovered to contain an access violation via the component /bz3_decode_block src/libbz3.c.

Related news

Ubuntu Security Notice USN-6824-1

Ubuntu Security Notice 6824-1 - It was discovered that GIFLIB incorrectly handled certain GIF files. An attacker could possibly use this issue to cause a denial of service.

CVE-2023-39741: heap-buffer-overflow in libzpaq/libzpaq.cpp:1208:25 libzpaq::PostProcessor::write(int) · Issue #246 · ckolivas/lrzip

lrzip v0.651 was discovered to contain a heap overflow via the libzpaq::PostProcessor::write(int) function at /libzpaq/libzpaq.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.

CVE-2023-39743: Read zero page memory · Issue #132 · pete4abw/lrzip-next

lrzip-next LZMA v23.01 was discovered to contain an access violation via the component /bz3_decode_block src/libbz3.c.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907