{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2241","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-04-22T15:42:11.291Z","datePublished":"2023-04-22T16:00:04.467Z","dateUpdated":"2025-02-04T16:31:38.051Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-22T14:56:13.623Z"},"title":"PoDoFo PdfXRefStreamParserObject.cpp readXRefStreamEntry heap-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-122","lang":"en","description":"CWE-122 Heap-based Buffer Overflow"}]}],"affected":[{"vendor":"n/a","product":"PoDoFo","versions":[{"version":"0.10.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in PoDoFo 0.10.0 gefunden. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion readXRefStreamEntry der Datei PdfXRefStreamParserObject.cpp. Durch Beeinflussen mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung. Der Patch wird als 535a786f124b739e3c857529cecc29e4eeb79778 bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-04-22T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-04-22T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-04-22T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-05-18T06:45:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"DaisyPo (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.227226","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.227226","tags":["signature","permissions-required"]},{"url":"https://github.com/podofo/podofo/issues/69","tags":["issue-tracking"]},{"url":"https://github.com/podofo/podofo/files/11260976/poc-file.zip","tags":["exploit"]},{"url":"https://github.com/podofo/podofo/commit/535a786f124b739e3c857529cecc29e4eeb79778","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:19:13.612Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.227226","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.227226","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/podofo/podofo/issues/69","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/podofo/podofo/files/11260976/poc-file.zip","tags":["exploit","x_transferred"]},{"url":"https://github.com/podofo/podofo/commit/535a786f124b739e3c857529cecc29e4eeb79778","tags":["patch","x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-04T16:30:13.911543Z","id":"CVE-2023-2241","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-04T16:31:38.051Z"}}]}}