netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
[
{
"id": "CVE-2023-28753-266f4d63",
"deprecated": false,
"digest": {
"length": 1816.0,
"function_hash": "59663670433824852223354277545642663787"
},
"signature_version": "v1",
"source": "https://github.com/facebook/netconsd/commit/9fc54edf54f7caea1189c2b979337ed37af2c60e",
"target": {
"file": "ncrx/libncrx.c",
"function": "parse_packet"
},
"signature_type": "Function"
},
{
"id": "CVE-2023-28753-9153f882",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"293030038434562898899202105994912814558",
"93965757223128170702896478274155644583",
"42921393433157974845763051021458125093",
"275575158588073184396923567334266554659"
]
},
"signature_version": "v1",
"source": "https://github.com/facebook/netconsd/commit/9fc54edf54f7caea1189c2b979337ed37af2c60e",
"target": {
"file": "ncrx/libncrx.c"
},
"signature_type": "Line"
}
]