CVE-2023-52389

UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
VendorProductVersion
pocoprojectpoco
𝑥
< 1.11.8
pocoprojectpoco
1.12.0 ≤
𝑥
< 1.12.5
pocoprojectpoco
1.11.8
pocoprojectpoco
1.11.8:p1
pocoprojectpoco
1.12.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
poco
bullseye
no-dsa
bookworm
no-dsa
buster
no-dsa
trixie
1.13.0-6
fixed
sid
1.13.0-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
poco
oracular
needs-triage
noble
needs-triage
mantic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored