cvelist/2023/32xxx/CVE-2023-32636.json

98 lines
3.4 KiB
JSON
Raw Normal View History

2023-05-30 12:00:38 +00:00
{
2023-09-14 20:00:47 +00:00
"data_version": "4.0",
2023-05-30 12:00:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-32636",
2023-09-14 20:00:47 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2023-05-30 12:00:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-14 20:00:47 +00:00
"value": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400",
"cweId": "CWE-400"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "glib",
"product": {
"product_data": [
{
"product_name": "glib",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.75.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/2841",
"refsource": "MISC",
"name": "https://gitlab.gnome.org/GNOME/glib/-/issues/2841"
},
{
"url": "https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835",
"refsource": "MISC",
"name": "https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835"
2023-11-10 19:00:37 +00:00
},
{
"url": "https://security.netapp.com/advisory/ntap-20231110-0002/",
"refsource": "MISC",
"name": "https://security.netapp.com/advisory/ntap-20231110-0002/"
2023-09-14 20:00:47 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseSeverity": "MEDIUM",
"baseScore": 4.7,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
2023-05-30 12:00:38 +00:00
}
]
}
}