Description
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-51349 | in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through buffer overflow. |
References
History
Mon, 09 Sep 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openatom
Openatom openharmony |
|
| CPEs | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* | |
| Vendors & Products |
Openharmony
Openharmony openharmony |
Openatom
Openatom openharmony |
Status: PUBLISHED
Assigner: OpenHarmony
Published:
Updated: 2024-08-28T19:44:43.689Z
Reserved: 2023-11-06T02:28:36.151Z
Link: CVE-2023-47217
Updated: 2024-08-02T21:01:22.826Z
Status : Modified
Published: 2023-11-20T12:15:08.990
Modified: 2024-11-21T08:29:58.547
Link: CVE-2023-47217
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD