跳转到帖子

NotepadPlusPlus: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2023-40036)

recommended_posts

发布于
  • Members

NotepadPlusPlus: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2023-40036)

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:C/I:N/A:N)
Published
08/25/2023
Created
09/11/2023
Added
09/11/2023
Modified
01/28/2025

Description

Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `CharDistributionAnalysis::HandleOneChar`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.

Solution(s)

  • notepadplusplus-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-40036
  • CVE - 2023-40036
  • https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
  • 查看数 701
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…