cvelist/2020/13xxx/CVE-2020-13496.json

70 lines
2.4 KiB
JSON
Raw Normal View History

2020-05-26 15:01:39 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13496",
2020-12-02 18:01:35 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Pixar",
"version": {
"version_data": [
{
"version_value": "Pixar OpenUSD 20.05, Apple macOS Catalina 10.15.3"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2022-04-28 14:36:12 -04:00
"value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
2020-12-02 18:01:35 +00:00
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105"
}
]
2020-05-26 15:01:39 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-12-02 18:01:35 +00:00
"value": "An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in TfToken Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file."
2020-05-26 15:01:39 +00:00
}
]
2022-04-18 17:22:54 -04:00
},
"impact": {
"cvss": {
"baseScore": 4.3,
"baseSeverity": "Medium",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
2020-05-26 15:01:39 +00:00
}
}