cvelist/2020/13xxx/CVE-2020-13498.json

90 lines
3.1 KiB
JSON
Raw Normal View History

2020-05-26 15:01:39 +00:00
{
2022-10-07 13:42:31 -04:00
"data_version": "4.0",
2020-05-26 15:01:39 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-13498",
2022-10-07 13:42:31 -04:00
"STATE": "PUBLIC",
"DATE_PUBLIC": "2020-11-12",
"ASSIGNER": "talos-cna@cisco.com"
2020-12-02 18:01:35 +00:00
},
2022-10-07 13:42:31 -04:00
"description": {
"description_data": [
2020-12-02 18:01:35 +00:00
{
2022-10-07 13:42:31 -04:00
"lang": "eng",
"value": "An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access which could lead to information disclosure. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file."
2020-12-02 18:01:35 +00:00
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105"
}
]
2020-05-26 15:01:39 +00:00
},
2022-04-18 17:22:54 -04:00
"impact": {
"cvss": {
"baseScore": 4.3,
"baseSeverity": "Medium",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
2022-10-07 13:42:31 -04:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125: Out-of-bounds Read"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apple",
"product": {
"product_data": [
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_value": "Catalina 10.15.3",
"version_affected": "="
}
]
}
}
]
}
},
{
"vendor_name": "Pixar",
"product": {
"product_data": [
{
"product_name": "OpenUSD",
"version": {
"version_data": [
{
"version_value": "20.05",
"version_affected": "="
}
]
}
}
]
}
}
]
}
2020-05-26 15:01:39 +00:00
}
}