Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-43641
HistoryOct 09, 2023 - 12:00 a.m.

CVE-2023-43641

2023-10-0900:00:00
ubuntu.com
ubuntu.com
10
libcue
vulnerability
code execution
cue sheet
gnome
tracker-miners

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

49.4%

libcue provides an API for parsing and extracting data from CUE sheets.
Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A
user of the GNOME desktop environment can be exploited by downloading a cue
sheet from a malicious webpage. Because the file is saved to ~/Downloads,
it is then automatically scanned by tracker-miners. And because it has a
.cue filename extension, tracker-miners use libcue to parse the file. The
file exploits the vulnerability in libcue to gain code execution. This
issue is patched in version 2.3.0.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlibcue< anyUNKNOWN
ubuntu20.04noarchlibcue< 2.2.1-2ubuntu0.1UNKNOWN
ubuntu22.04noarchlibcue< 2.2.1-3ubuntu0.1UNKNOWN
ubuntu23.04noarchlibcue< 2.2.1-4ubuntu0.1UNKNOWN
ubuntu23.10noarchlibcue< 2.2.1-4ubuntu1UNKNOWN
ubuntu24.04noarchlibcue< 2.2.1-4ubuntu1UNKNOWN
ubuntu16.04noarchlibcue< anyUNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

49.4%