
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52389 is a security vulnerability discovered in POCO's UTF32Encoding.cpp component. The issue involves an integer overflow and resultant stack buffer overflow in Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() functions, which may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. The vulnerability was fixed in POCO versions 1.11.8p2, 1.12.5p2, and 1.13.0 (NVD, Debian Security).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is classified as CWE-190 (Integer Overflow or Wraparound). The vulnerability affects the UTF32Encoding functionality in POCO, specifically in the convert() and queryConvert() methods (NVD).
The vulnerability affects POCO C++ libraries used for building network-based applications. Given the CVSS score of 9.8, this is considered a critical security issue that could potentially lead to system compromise through stack buffer overflow exploitation (Debian LTS).
Users are advised to upgrade to the fixed versions: POCO 1.11.8p2, 1.12.5p2, or 1.13.0. For Debian 11 (bullseye) users, the fix is available in version 1.10.0-6+deb11u2. System administrators are strongly recommended to upgrade their POCO packages to the patched versions (POCO Blog, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."