A buffer overflow vulnerability in “diagstatus” command in Brocade Fabric OS before Brocade Fabric v9.2.0 and v9.1.1c could allow an authenticated user to crash the Brocade Fabric OS switch leading to a denial of service.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20230908-0007/ | Third Party Advisory |
https://support.broadcom.com/external/content/SecurityAdvisories/0/22384 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230908-0007/ | Third Party Advisory |
https://support.broadcom.com/external/content/SecurityAdvisories/0/22384 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Feb 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A buffer overflow vulnerability in “diagstatus” command in Brocade Fabric OS before Brocade Fabric v9.2.0 and v9.1.1c could allow an authenticated user to crash the Brocade Fabric OS switch leading to a denial of service. |
Information
Published : 2023-08-02 00:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-31431
Mitre link : CVE-2023-31431
CVE.ORG link : CVE-2023-31431
JSON object : View
Products Affected
broadcom
- brocade_fabric_operating_system
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')