
Cloud Vulnerability DB
A community-led vulnerabilities database
Catdoc version 0.95 contains a global buffer overflow vulnerability identified as CVE-2023-31979. The vulnerability was discovered in the process_file function located in the /src/reader.c file. This security issue affects the core functionality of the Catdoc software, which is used for text extraction from Microsoft Office documents (NVD, CVE).
The vulnerability is classified as a classic buffer overflow (CWE-120) that occurs in the process_file function. The issue manifests when processing input with the '-b' option, leading to a global buffer overflow condition. The vulnerability has received a CVSS v3.1 base score of 7.8 (HIGH), with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access requirements but high impact potential (NVD, GitHub Issue).
When exploited, this vulnerability can lead to a global buffer overflow condition that affects memory integrity. The overflow occurs specifically when reading memory at certain addresses, which could potentially lead to arbitrary code execution or system crashes. The high CVSS score indicates severe potential impacts on confidentiality, integrity, and availability of the affected system (NVD).
The vulnerability affects Debian packages in various distributions including bullseye (1:0.95-4.1), sid, trixie, and bookworm (1:0.95-5). As of the latest reports, this vulnerability remains unfixed in the unstable branch (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."