CVE-2023-32181

LOW

Opensuse Libeconf < 0.5.2 - Buffer Overflow

Title source: rule
STIX 2.1

Description

A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.

References (3)

Core 3
Core References
Broken Link, Issue Tracking, Vendor Advisory
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181
Broken Link, Issue Tracking, Vendor Advisory
https://https://github.com/openSUSE/libeconf/issues/178

Scores

CVSS v3 3.3
EPSS 0.0009
EPSS Percentile 24.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (1)
opensuse/libeconf < 0.5.2
Published Jun 01, 2023
Tracked Since Feb 18, 2026