in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow.
References
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md - Broken Link | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.0 |
09 Sep 2024, 12:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openatom
Openatom openharmony |
|
CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* |
24 Nov 2023, 15:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CPE | cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:* | |
First Time |
Openharmony
Openharmony openharmony |
|
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md - Broken Link | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
20 Nov 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-20 12:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-47217
Mitre link : CVE-2023-47217
CVE.ORG link : CVE-2023-47217
JSON object : View
Products Affected
openatom
- openharmony
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')