CVE-2023-40164: Global buffer read overflow in nsCodingStateMachine::NextState.CVE-2023-40036: Global buffer read overflow in CharDistributionAnalysisHandle:: HandleOneChar caused by an array index order based on the buffer size and exacerbated using the uchardet library.CVE-2023-40031: Buffer overflow in the Utf8_16_Read::convert function due to incorrect assumptions about UTF16 to UTF8 encoding conversions. Listed four Vulnerabilities discovered by GitHub’s researcher: Proof of concept exploits has also been published for these flaws in the researcher’s public advisory, making it crucial for users to update to the latest version as soon as possible. Discovered vulnerabilities involve heap buffer write and read overflows in various functions and libraries used by Notepad++. GitHub’s security researcher, Jaroslav Lobačevski, reported the vulnerabilities in Notepad++ version 8.5.2 to the developers over the last couple of months. Notepad++ is a popular free source code editor that supports many programming languages, can be extended via plugins, and offers productivity-enhancing features such as multi-tabbed editing and syntax highlighting. Notepad++ version 8.5.7 has been released with security updates for multiple buffer overflow vulnerabilities identified in the previous version.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |