Impact
A flaw in libucl allows a remote attacker to supply a specially crafted Universal Configuration Language (UCL) input containing a key with an embedded null byte. When parsed, the ucl_object_emit function crashes with a segmentation fault, resulting in a denial of service. The weakness is identified as CWE-125, an out‑of-bounds read that can lead to memory corruption.
Affected Systems
The vulnerability affects the libucl:libucl product. No specific version information is provided, so all versions of libucl that use the vulnerable parsing routine are potentially impacted.
Risk and Exploitability
The CVSS score of 8.3 signifies a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. A remote attacker can exploit this by sending the crafted UCL input, likely to any service that processes UCL data. The attack vector is remote, and the primary consequence is a service crash that leads to a denial of service. No additional prerequisites are mentioned, implying that the vulnerability could be triggered in normal operation when untrusted input is processed.
OpenCVE Enrichment