CVE-2023-36328

Source
https://cve.org/CVERecord?id=CVE-2023-36328
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-36328.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-36328
Downstream
Related
Published
2023-09-01T16:15:08.177Z
Modified
2026-01-31T00:22:22.625074Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS).

References

Affected packages

Git / github.com/libtom/libtommath

Affected ranges

Type
GIT
Repo
https://github.com/libtom/libtommath
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.01
0.02
0.03
0.04
0.05
0.06
0.07
0.08
0.09
0.10
0.11
0.12
0.13
0.14
0.15
0.16
0.17
0.18
0.19
0.20
0.21
0.22
0.23
0.24
0.25
0.26
0.27
0.28
0.29
0.30
0.31
0.32
0.33
0.34
0.35
0.36
0.37
0.38
0.39
0.40
0.41
Other
semver
v0.*
v0.42.0
v0.43.0-rc0
v1.*
v1.0
v1.0-rc1
v1.0-rc2
v1.0.0-rc0
v1.0.1
v1.0.1-rc1
v1.0.1-rc2
v1.1.0
v1.1.0-rc1
v1.1.0-rc2
v1.1.0-rc3
v1.1.0-rc4
v1.1.0-rc5
v1.2.0
v1.2.0-rc1
v1.2.0-rc2
v1.2.0-rc3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-36328.json"