Lucene search

K
vulnrichmentTalosVULNRICHMENT:CVE-2023-27390
HistoryJul 05, 2023 - 3:51 p.m.

CVE-2023-27390

2023-07-0515:51:51
CWE-122
talos
github.com
4
heap-based buffer overflow
diagon v1.0.139
sequence::drawtext
arbitrary code execution
markdown file
malicious file
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

29.9%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:diagon_project:diagon:1.0.139:*:*:*:*:*:*:*"
    ],
    "vendor": "diagon_project",
    "product": "diagon",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.139"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

29.9%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-27390