CVE-2023-26157

Versions of the package libredwg before 0.12.5.6384 are vulnerable to Denial of Service (DoS) due to an out-of-bounds read involving section->num_pages in decode_r2007.c.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*

History

08 Jan 2024, 19:33

Type Values Removed Values Added
First Time Gnu libredwg
Gnu
CPE cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-125
References () https://github.com/LibreDWG/libredwg/issues/850 - () https://github.com/LibreDWG/libredwg/issues/850 - Exploit, Issue Tracking, Patch
References () https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730 - () https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730 - Third Party Advisory
References () https://github.com/LibreDWG/libredwg/commit/c8cf03ce4c2315b146caf582ea061c0460193bcc - () https://github.com/LibreDWG/libredwg/commit/c8cf03ce4c2315b146caf582ea061c0460193bcc - Patch

02 Jan 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-02 05:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-26157

Mitre link : CVE-2023-26157

CVE.ORG link : CVE-2023-26157


JSON object : View

Products Affected

gnu

  • libredwg
CWE
CWE-125

Out-of-bounds Read

CWE-400

Uncontrolled Resource Consumption