A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decodestatusreport() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious base station, or just SMS. There is a bound check for this memcpy length in decodesubmit(), but it was forgotten in decodestatus_report().
{
"cwe_ids": [
"CWE-119"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/4xxx/CVE-2023-4232.json",
"cna_assigner": "fedora"
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:ofono_project:ofono:*:*:*:*:*:*:*:*"
}