netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32391 netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: facebook

Published:

Updated: 2025-01-21T20:13:01.794Z

Reserved: 2023-03-22T20:36:03.271Z

Link: CVE-2023-28753

cve-icon Vulnrichment

Updated: 2024-08-02T13:51:37.299Z

cve-icon NVD

Status : Modified

Published: 2023-05-18T22:15:09.860

Modified: 2025-01-21T21:15:09.883

Link: CVE-2023-28753

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.