{"id":"CVE-2023-23082","details":"A heap buffer overflow vulnerability in Kodi Home Theater Software up to 19.5 allows attackers to cause a denial of service due to an improper length of the value passed to the offset argument.","modified":"2026-02-24T01:24:23.063136Z","published":"2023-02-03T22:15:12.277Z","references":[{"type":"WEB","url":"https://github.com/xbmc/xbmc/pull/22380/commits/00fec1dbdd1df827872c7b55ad93059636dfc076"},{"type":"WEB","url":"https://github.com/xbmc/xbmc/pull/22380/commits/7e5f9fbf9aaa3540aab35e7504036855b23dcf60"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html"},{"type":"ADVISORY","url":"https://github.com/xbmc/xbmc/commit/8c2aafb6d4987833803e037c923aaf83f9ff41e1"},{"type":"ADVISORY","url":"https://github.com/xbmc/xbmc/issues/22377"},{"type":"ADVISORY","url":"https://github.com/xbmc/xbmc/pull/22380"},{"type":"REPORT","url":"https://github.com/xbmc/xbmc/issues/22377"},{"type":"FIX","url":"https://github.com/xbmc/xbmc/commit/8c2aafb6d4987833803e037c923aaf83f9ff41e1"},{"type":"FIX","url":"https://github.com/xbmc/xbmc/issues/22377"},{"type":"FIX","url":"https://github.com/xbmc/xbmc/pull/22380"},{"type":"EVIDENCE","url":"https://github.com/xbmc/xbmc/issues/22377"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/xbmc/xbmc","events":[{"introduced":"0"},{"fixed":"8c2aafb6d4987833803e037c923aaf83f9ff41e1"}]}],"versions":["14.0a2-Helix","14.0a3-Helix","14.0a4-Helix","14.0b1-Helix","14.0b2-Helix","14.0b3-Helix","14.0b4-Helix","14.0b5-Helix","14.0rc1-Helix","14.0rc2-Helix","14.0rc3-Helix","15.0a1-Isengard","15.0a2-Isengard","15.0b1-Isengard","15.0b2-Isengard","15.0rc1-Isengard","16.0a1-Jarvis","16.0a2-Jarvis","16.0a3-Jarvis","16.0a4-Jarvis","16.0b1-Jarvis","16.0b2-Jarvis","17.0a1-Krypton","17.0a2-Krypton","17.0a3-Krypton","17.0b1-Krypton","17.0b2-Krypton","17.0b3-Krypton","17.0b4-Krypton","17.0b5-Krypton","17.0b6-Krypton","18.0-Leia","18.0a1-Leia","18.0a2-Leia","18.0a3-Leia","18.0b1-Leia","18.0b1v2-Leia","18.0b2-Leia","18.0b3-Leia","18.0b4-Leia","18.0b5-Leia","18.0rc1-Leia","18.0rc2-Leia","18.0rc3-Leia","18.0rc4-Leia","18.0rc5-Leia","18.0rc5.2-Leia","18.1-Leia","18.1rc1-Leia","18.2rc1-Leia","19.0-Matrix","19.0RC1-Matrix","19.0a1-Matrix","19.0a2-Matrix","19.0a3-Matrix","19.0b1-Matrix","19.0b1Android-Matrix","19.0b2-Matrix","20.0a1-Nexus","20.0a2-Nexus","20.0a3-Nexus","20.0b1-Nexus","20.0rc1-Nexus","Frodo_alpha1","Frodo_alpha2","Frodo_alpha3","Frodo_alpha4","Frodo_alpha5","Frodo_alpha6","Frodo_alpha7","Frodo_beta1","Frodo_beta2","Frodo_beta3","Frodo_rc1","Frodo_rc2","Frodo_rc3","Gotham_alpha1","Gotham_alpha10","Gotham_alpha11","Gotham_alpha2","Gotham_alpha3","Gotham_alpha4","Gotham_alpha5","Gotham_alpha6","Gotham_alpha7","Gotham_alpha8","Gotham_alpha9","howto-cleanup-logic","legacy_drop_vs","master-last-commmit-before-python3-merge"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-23082.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}