{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52558","assignerOrgId":"9119a7d8-5eab-497f-8521-727c672e3725","state":"PUBLISHED","assignerShortName":"cisa-cg","dateReserved":"2024-03-01T16:04:51.307Z","datePublished":"2024-03-01T16:33:06.604Z","dateUpdated":"2024-11-19T21:42:52.858Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"OpenBSD","repo":"https://github.com/openbsd/src/","vendor":"OpenBSD","versions":[{"lessThan":"7.3 errata 019","status":"affected","version":"7.3 ","versionType":"custom"},{"lessThan":"7.4 errata 002","status":"affected","version":"7.4","versionType":"custom"}]}],"datePublic":"2023-10-25T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In OpenBSD 7.4 before errata 002 and OpenBSD 7.3 before errata 019, a&nbsp;network buffer that had to be split at certain length that could crash the kernel after receiving specially crafted escape sequences."}],"value":"In OpenBSD 7.4 before errata 002 and OpenBSD 7.3 before errata 019, a network buffer that had to be split at certain length that could crash the kernel after receiving specially crafted escape sequences."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-131","description":"CWE-131 Incorrect Calculation of Buffer Size","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9119a7d8-5eab-497f-8521-727c672e3725","shortName":"cisa-cg","dateUpdated":"2024-03-01T16:39:00.281Z"},"references":[{"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/002_msplit.patch.sig"},{"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/019_msplit.patch.sig"},{"url":"https://github.com/openbsd/src/commit/7b4d35e0a60ba1dd4daf4b1c2932020a22463a89"}],"source":{"discovery":"UNKNOWN"},"title":"OpenBSD 7.4 and 7.3 m_split() network buffer kernel crash","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"openbsd","product":"openbsd","cpes":["cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"7.3","status":"affected","lessThan":"7.3_errata_019","versionType":"custom"},{"version":"7.4","status":"affected","lessThan":"7.4_errata_002","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-11-19T21:41:24.595292Z","id":"CVE-2023-52558","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-19T21:42:52.858Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:20.692Z"},"title":"CVE Program Container","references":[{"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/002_msplit.patch.sig","tags":["x_transferred"]},{"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/019_msplit.patch.sig","tags":["x_transferred"]},{"url":"https://github.com/openbsd/src/commit/7b4d35e0a60ba1dd4daf4b1c2932020a22463a89","tags":["x_transferred"]}]}]}}