Description
A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2.
References (3)
Core 3
Core References
Broken Link, Issue Tracking, Vendor Advisory
https://https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32181
Broken Link, Issue Tracking, Vendor Advisory
https://https://github.com/openSUSE/libeconf/issues/178
Issue Tracking
https://github.com/openSUSE/libeconf/issues/178
Scores
CVSS v3
3.3
EPSS
0.0009
EPSS Percentile
24.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (1)
opensuse/libeconf
< 0.5.2
Published
Jun 01, 2023
Tracked Since
Feb 18, 2026