CVE-2023-36377

Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and before allows a local attacker to execute arbitrary code via a crafted .exe, .sys, and .dll files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osslsigncode_project:osslsigncode:2.3:*:*:*:*:*:*:*

History

23 Dec 2023, 10:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2023/12/msg00016.html -

10 Jul 2023, 17:28

Type Values Removed Values Added
First Time Osslsigncode Project osslsigncode
Osslsigncode Project
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References (MISC) https://github.com/mtrojnar/osslsigncode/releases/tag/2.3 - (MISC) https://github.com/mtrojnar/osslsigncode/releases/tag/2.3 - Release Notes
References (MISC) https://github.com/mtrojnar/osslsigncode/compare/2.2...2.3 - (MISC) https://github.com/mtrojnar/osslsigncode/compare/2.2...2.3 - Release Notes
CPE cpe:2.3:a:osslsigncode_project:osslsigncode:2.3:*:*:*:*:*:*:*
CWE CWE-120

03 Jul 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-03 21:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-36377

Mitre link : CVE-2023-36377

CVE.ORG link : CVE-2023-36377


JSON object : View

Products Affected

osslsigncode_project

  • osslsigncode
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')