9.8
CVE-2023-35856
- EPSS 0.05%
- Veröffentlicht 19.06.2023 04:15:11
- Zuletzt bearbeitet 21.11.2024 08:08:50
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
A buffer overflow in Nintendo Mario Kart Wii RMCP01, RMCE01, RMCJ01, and RMCK01 can be exploited by a game client to execute arbitrary code on a client's machine via a crafted packet.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nintendo ≫ Mario Kart Wii Versionrmce01
Nintendo ≫ Mario Kart Wii Versionrmcj01
Nintendo ≫ Mario Kart Wii Versionrmck01
Nintendo ≫ Mario Kart Wii Versionrmcp01
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.152 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.