
Cloud Vulnerability DB
A community-led vulnerabilities database
A Buffer Overflow vulnerability was discovered in libxls version 1.6.2, identified as CVE-2023-38852. The vulnerability affects the unicode_decode_wcstombs function in xlstool.c at line 266, allowing remote attackers to execute arbitrary code and cause a denial of service through a crafted XLS file (NVD).
The vulnerability is classified as a heap buffer overflow with a CVSS v3.1 Base Score of 6.5 (Medium). The issue occurs in the unicode_decode_wcstombs function when processing crafted XLS files, potentially leading to memory corruption. The vulnerability specifically manifests in xlstool.c:266, where improper boundary checking allows for buffer overflow conditions (Github Issue).
When exploited, this vulnerability can lead to arbitrary code execution and denial of service conditions. The attack requires user interaction as it needs a crafted XLS file to be processed by the affected application (NVD).
Security updates have been released to address this vulnerability. Fedora has released patches in versions libxls-1.6.2-14.fc39 and libxls-1.6.2-14.fc38. Users are advised to upgrade to the patched versions (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."