CVE-2023-36377

NameCVE-2023-36377
DescriptionBuffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and before allows a local attacker to execute arbitrary code via a crafted .exe, .sys, and .dll files.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3693-1
Debian Bugs1035875

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
osslsigncode (PTS)stretch1.7.1-2vulnerable
buster (security), buster, buster (lts)2.0+really2.5-4+deb10u1fixed
bullseye2.1-1vulnerable
bookworm2.5-4fixed
sid, trixie2.9-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
osslsigncodesourcestretch(unfixed)end-of-life
osslsigncodesourcebuster2.0+really2.5-4+deb10u1DLA-3693-1
osslsigncodesource(unstable)2.3.0-11035875

Notes

[bullseye] - osslsigncode <no-dsa> (Minor issue)
https://github.com/mtrojnar/osslsigncode/releases/tag/2.3

Search for package or bug name: Reporting problems