cvelist/2023/1xxx/CVE-2023-1444.json

110 lines
4.0 KiB
JSON
Raw Normal View History

2023-03-17 07:00:34 +00:00
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1444",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
2023-03-26 08:00:46 +00:00
"value": "A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects the function 0x8011206B in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability."
2023-03-17 07:00:34 +00:00
},
{
"lang": "deu",
2023-03-26 08:00:46 +00:00
"value": "Eine Schwachstelle wurde in Filseclab Twister Antivirus 8 ausgemacht. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion 0x8011206B in der Bibliothek fildds.sys der Komponente IoControlCode Handler. Dank der Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
2023-03-17 07:00:34 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-404 Denial of Service",
"cweId": "CWE-404"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Filseclab",
"product": {
"product_data": [
{
"product_name": "Twister Antivirus",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "8"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.223289",
"refsource": "MISC",
"name": "https://vuldb.com/?id.223289"
},
{
"url": "https://vuldb.com/?ctiid.223289",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.223289"
},
{
2023-10-21 09:00:43 +00:00
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444",
2023-03-17 07:00:34 +00:00
"refsource": "MISC",
2023-10-21 09:00:43 +00:00
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444"
2023-03-17 07:00:34 +00:00
},
{
2023-10-21 09:00:43 +00:00
"url": "https://drive.google.com/file/d/1KrkezTwgmt5CnhzlyyWVNLIAeiMvuDEr/view",
2023-03-17 07:00:34 +00:00
"refsource": "MISC",
2023-10-21 09:00:43 +00:00
"name": "https://drive.google.com/file/d/1KrkezTwgmt5CnhzlyyWVNLIAeiMvuDEr/view"
2023-03-17 07:00:34 +00:00
}
]
},
"credits": [
{
"lang": "en",
"value": "Zeze7w (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseSeverity": "HIGH"
},
{
"version": "3.0",
"baseScore": 7.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseSeverity": "HIGH"
},
{
"version": "2.0",
"baseScore": 7.8,
2023-10-21 09:00:43 +00:00
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
2023-03-17 07:00:34 +00:00
}
]
}
}