CVE-2023-42799 relates to a buffer overflow vulnerability in Moonlight-Common-C software allowing remote code execution. Learn about impact, technical details & mitigation.
A buffer overflow vulnerability was identified in the moonlight-common-c software due to the unmitigated usage of unsafe C functions and improper bounds checking. This CVE allows attackers to crash the moonlight client or potentially execute remote code on the client.
Understanding CVE-2023-42799
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. The vulnerability arises from buffer overflow starting in a specific commit due to unsafe C functions.
What is CVE-2023-42799?
The CVE-2023-42799 relates to a buffer overflow vulnerability in the moonlight-common-c software, allowing malicious actors to potentially crash clients or execute remote code.
The Impact of CVE-2023-42799
The vulnerability poses a high risk with a CVSS v3.1 base score of 8.8. It could lead to unauthorized access, data tampering, or denial of service attacks on affected systems.
Technical Details of CVE-2023-42799
The vulnerability in moonlight-common-c is due to the unmitigated use of
strcpy
in parseUrlAddrFromRtspUrlString
function, resulting in a classic buffer overflow vulnerability.
Vulnerability Description
The vulnerability allows a malicious game streaming server to exploit a buffer overflow, potentially crashing a moonlight client or executing remote code on the client.
Affected Systems and Versions
Vendor: moonlight-stream Product: moonlight-common-c Affected Versions: >= 50c0a51b10ecc5b3415ea78c21d96d679e2288f9, < 02b7742f4d19631024bd766bd2bb76715780004e
Exploitation Mechanism
Attack Complexity: Low Attack Vector: Network Impact: High Confidentiaility, Integrity, and Availability impact User Interaction: Required
Mitigation and Prevention
It is crucial to take immediate steps to secure systems and prevent exploitation of this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Refer to the GitHub links below for the commit addressing the vulnerability: