cvelist/2023/1xxx/CVE-2023-1443.json

110 lines
4.1 KiB
JSON
Raw Normal View History

2023-03-17 07:00:34 +00:00
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-1443",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
2023-03-26 08:00:46 +00:00
"value": "A vulnerability was found in Filseclab Twister Antivirus 8. It has been declared as problematic. This vulnerability affects the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223288."
2023-03-17 07:00:34 +00:00
},
{
"lang": "deu",
2023-03-26 08:00:46 +00:00
"value": "In Filseclab Twister Antivirus 8 wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Dabei geht es um die Funktion 0x80112053 in der Bibliothek fildds.sys der Komponente IoControlCode Handler. Durch Beeinflussen mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
2023-03-17 07:00:34 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-404 Denial of Service",
"cweId": "CWE-404"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Filseclab",
"product": {
"product_data": [
{
"product_name": "Twister Antivirus",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "8"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.223288",
"refsource": "MISC",
"name": "https://vuldb.com/?id.223288"
},
{
"url": "https://vuldb.com/?ctiid.223288",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.223288"
},
{
2023-10-21 09:00:43 +00:00
"url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443",
2023-03-17 07:00:34 +00:00
"refsource": "MISC",
2023-10-21 09:00:43 +00:00
"name": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443"
2023-03-17 07:00:34 +00:00
},
{
2023-10-21 09:00:43 +00:00
"url": "https://drive.google.com/file/d/1xwIyZ8RRdwsHshxhtFMELPv2DdbQ8hBD/view",
2023-03-17 07:00:34 +00:00
"refsource": "MISC",
2023-10-21 09:00:43 +00:00
"name": "https://drive.google.com/file/d/1xwIyZ8RRdwsHshxhtFMELPv2DdbQ8hBD/view"
2023-03-17 07:00:34 +00:00
}
]
},
"credits": [
{
"lang": "en",
"value": "Zeze7w (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.5,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 7.8,
2023-10-21 09:00:43 +00:00
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
2023-03-17 07:00:34 +00:00
}
]
}
}