CVE-2023-40857
Publication date 28 August 2023
Last updated 3 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
Buffer Overflow vulnerability in VirusTotal yara v.4.3.2 allows a remote attacker to execute arbtirary code via the yr_execute_cod function in the exe.c component.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| yara | 25.10 questing | Ignored rejected upstream |
| 24.04 LTS noble | Ignored rejected upstream | |
| 22.04 LTS jammy | Ignored rejected upstream | |
| 20.04 LTS focal | Ignored end of standard support, was needs-triage | |
| 18.04 LTS bionic | Ignored end of standard support | |
| 16.04 LTS xenial | Ignored end of standard support | |
| 14.04 LTS trusty | Ignored end of standard support |
Notes
john-breton
This is not a real security vulnerability per upstream. Marking as ignored since there's no fix due to the attack vector being an unsupported feature of yara that inherently comes with security risks when exercised.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |