{"api_version":"1","generated_at":"2026-04-23T16:55:47+00:00","cve":"CVE-2023-39914","urls":{"html":"https://cve.report/CVE-2023-39914","api":"https://cve.report/api/cve/CVE-2023-39914.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39914","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39914"},"summary":{"title":"CVE-2023-39914","description":"NLnet Labs’ bcder library up to and including version 0.7.2 panics while decoding certain invalid input data rather than rejecting the data with an error. This can affect both the actual decoding stage as well as accessing content of types that utilized delayed decoding.","state":"PUBLIC","assigner":"sep@nlnetlabs.nl","published_at":"2023-09-13 15:15:00","updated_at":"2023-09-15 15:17:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt","name":"https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39914","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39914","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39914","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nlnetlabs","cpe5":"bcder","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-39914","qid":"995286","title":"Rust (Rust) Security Update for bcder (GHSA-6jmw-6mxw-w4jc)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39914","ASSIGNER":"sep@nlnetlabs.nl","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"NLnet Labs’ bcder library up to and including version 0.7.2 panics while decoding certain invalid input data rather than rejecting the data with an error. This can affect both the actual decoding stage as well as accessing content of types that utilized delayed decoding."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-228: Improper Handling of Syntactically Invalid Structure","cweId":"CWE-228"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"NLnet Labs","product":{"product_data":[{"product_name":"bcder","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"version":"*","status":"affected","lessThan":"0.7.3","versionType":"semver"},{"version":"0.7.3","status":"unaffected","lessThan":"*","versionType":"semver"}],"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt","refsource":"MISC","name":"https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt"}]},"solution":[{"lang":"en","value":"This issue is fixed in 0.7.3 and all later versions."}],"credits":[{"lang":"en","value":"Haya Shulman"},{"lang":"en","value":"Donika Mirdita"},{"lang":"en","value":"Niklas Vogel"}],"impact":{"cvss":[{"version":"3.1","baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}},"nvd":{"publishedDate":"2023-09-13 15:15:00","lastModifiedDate":"2023-09-15 15:17:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nlnetlabs:bcder:*:*:*:*:*:*:*:*","versionEndExcluding":"0.7.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}