There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between the original ClientHello and the second ClientHello, crashing the process (impact is limited to denial of service).
References
Configurations
History
21 Nov 2024, 07:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebad0eb215265 - Patch | |
References | () https://www.facebook.com/security/advisories/cve-2023-23759 - Patch, Vendor Advisory |
27 May 2023, 00:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-617 | |
First Time |
Facebook
Facebook fizz |
|
CPE | cpe:2.3:a:facebook:fizz:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://www.facebook.com/security/advisories/cve-2023-23759 - Patch, Vendor Advisory | |
References | (MISC) https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebad0eb215265 - Patch |
Information
Published : 2023-05-18 22:15
Updated : 2024-11-21 07:46
NVD link : CVE-2023-23759
Mitre link : CVE-2023-23759
CVE.ORG link : CVE-2023-23759
JSON object : View
Products Affected
- fizz
CWE
CWE-617
Reachable Assertion