CVE-2023-29144
BaseFortify
Publication date: 2025-12-12
Last updated on: 2025-12-19
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| malwarebytes | malwarebytes | 1.0.14 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-190 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is related to Malwarebytes Endpoint Agent for Linux versions prior to 1.1.64 and Malwarebytes for Windows v5 with update package versions below 1.0.104841 not properly computing signatures, allowing detection bypass. To detect if your system is vulnerable, check the installed version of Malwarebytes Endpoint Agent for Linux or Malwarebytes for Windows. For Linux, you can run a command like `malwarebytes --version` or check the package version via your package manager. For Windows, check the version in the application or via command line tools like `wmic product get name,version` to verify if the version is below the patched one. There are no specific network detection commands provided in the resources. [2]
Can you explain this vulnerability to me?
This vulnerability in Malwarebytes 1.0.14 for Linux involves improper computation of signatures in certain scenarios, which allows an attacker to bypass detection by the software.
How can this vulnerability impact me? :
The impact of this vulnerability is that malware or malicious activity may go undetected by Malwarebytes on Linux systems, potentially allowing harmful software to operate without being flagged or removed.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade affected endpoints to the patched versions. For Malwarebytes Endpoint Agent for Linux, upgrade to version 1.1.64 or later. For Malwarebytes for Windows v5, upgrade to version 5.3.0.186 or higher with update package version 1.0.104841 or above. [2]