CVE-2023-34095

Source
https://cve.org/CVERecord?id=CVE-2023-34095
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34095.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-34095
Aliases
  • GHSA-25j7-9gfc-f46x
Downstream
Published
2023-06-14T16:58:50.887Z
Modified
2026-04-16T04:11:29.379803Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
cpdb-libs vulnerable to buffer overflows via scanf
Details

cpdb-libs provides frontend and backend libraries for the Common Printing Dialog Backends (CPDB) project. In versions 1.0 through 2.0b4, cpdb-libs is vulnerable to buffer overflows via improper use of scanf(3). cpdb-libs uses the fscanf() and scanf() functions to parse command lines and configuration files, dropping the read string components into fixed-length buffers, but does not limit the length of the strings to be read by fscanf() and scanf() causing buffer overflows when a string is longer than 1023 characters. A patch for this issue is available at commit f181bd1f14757c2ae0f17cc76dc20421a40f30b7. As all buffers have a length of 1024 characters, the patch limits the maximum string length to be read to 1023 by replacing all occurrences of %s with %1023s in all calls of the fscanf() and scanf() functions.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/34xxx/CVE-2023-34095.json",
    "cwe_ids": [
        "CWE-121"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/openprinting/cpdb-libs

Affected ranges

Type
GIT
Repo
https://github.com/openprinting/cpdb-libs
Events

Affected versions

2.*
2.0b1
2.0b2
2.0b3
2.0b4
2.0b4-make-install-fix
v1.*
v1.0
v1.1.0
v1.1.1
v1.1.2
v1.2.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34095.json"