
Cloud Vulnerability DB
A community-led vulnerabilities database
Buffer Overflow vulnerability was discovered in Liblouis version 3.24.0, identified as CVE-2023-26767. The vulnerability allows remote attackers to cause a denial of service through the lou_logFile function at logginc.c endpoint. The issue was reported in February 2023 and affects the core functionality of Liblouis, a popular software library (NVD, CVE).
The vulnerability is classified as a classic buffer overflow (CWE-120) that occurs when a long path is provided to the lou_setDataPath() API. The issue stems from the software's failure to check input length before copying data into a fixed-size buffer. The vulnerability received a CVSS v3.1 Base Score of 7.5 (HIGH), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating high availability impact with network accessibility (NVD, GitHub Issue).
The primary impact of this vulnerability is the potential for denial of service attacks. When successfully exploited, an attacker can trigger a global buffer overflow condition, which could lead to service disruption. The vulnerability affects the availability of the system while confidentiality and integrity remain uncompromised (NVD).
The vulnerability has been fixed in version 3.33.0-1 of Liblouis. The fix involves checking the length of the path before copying it into the dataPath buffer. Users are advised to upgrade to the patched version. The fix was implemented through a pull request that addresses the security concerns related to unchecked strcpy usage (GitHub PR, Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."