Bug ID 1223851
Summary VUL-0: CVE-2023-44428: musescore: heap-based buffer overflow within the parsing of CAP files
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/380869/
OS Other
Status NEW
Severity Major
Priority P5 - None
Component Security
Assignee cornelis@solcon.nl
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

MuseScore CAP File Parsing Heap-based Buffer Overflow Remote Code Execution
Vulnerability. This vulnerability allows remote attackers to execute arbitrary
code on affected installations of MuseScore. User interaction is required to
exploit this vulnerability in that the target must visit a malicious page or
open a malicious file.

The specific flaw exists within the parsing of CAP files. The issue results
from the lack of proper validation of the length of user-supplied data prior to
copying it to a heap-based buffer. An attacker can leverage this vulnerability
to execute code in the context of the current process. Was ZDI-CAN-20769.

References:
https://www.zerodayinitiative.com/advisories/ZDI-23-1526/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44428
https://www.cve.org/CVERecord?id=CVE-2023-44428
http://www.zerodayinitiative.com/advisories/ZDI-23-1526/


You are receiving this mail because: