Use-after-Free Vulnerability in cflow by GNU
CVE-2020-23856

5.5MEDIUM

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
18 May 2021

Summary

A Use-after-Free vulnerability exists in cflow 1.6, specifically within the void call(char *name, int line) function located at src/parser.c. This flaw arises from the misuse of a pointer variable, caller->callee, which can be exploited to trigger a denial of service condition. Attackers may manipulate memory access, leading to unexpected behaviors and potential crashes of the application.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.