From 2147cab71a1e547b5594182296cc3794d28f6066 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 13 May 2020 16:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/13xxx/CVE-2019-13538.json | 2 +- 2019/15xxx/CVE-2019-15878.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15879.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15880.json | 62 ++++++++++++++++++++++++++++++++++ 2019/9xxx/CVE-2019-9682.json | 58 +++++++++++++++++++++++++++---- 2020/5xxx/CVE-2020-5838.json | 50 +++++++++++++++++++++++++-- 2020/7xxx/CVE-2020-7454.json | 50 +++++++++++++++++++++++++-- 2020/7xxx/CVE-2020-7455.json | 50 +++++++++++++++++++++++++-- 2020/9xxx/CVE-2020-9501.json | 50 +++++++++++++++++++++++++-- 2020/9xxx/CVE-2020-9502.json | 50 +++++++++++++++++++++++++-- 10 files changed, 473 insertions(+), 23 deletions(-) create mode 100644 2019/15xxx/CVE-2019-15878.json create mode 100644 2019/15xxx/CVE-2019-15879.json create mode 100644 2019/15xxx/CVE-2019-15880.json diff --git a/2019/13xxx/CVE-2019-13538.json b/2019/13xxx/CVE-2019-13538.json index afe03aefd14..21a8268ddb4 100644 --- a/2019/13xxx/CVE-2019-13538.json +++ b/2019/13xxx/CVE-2019-13538.json @@ -55,7 +55,7 @@ "description_data": [ { "lang": "eng", - "value": "3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.15.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only." + "value": "3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only." } ] } diff --git a/2019/15xxx/CVE-2019-15878.json b/2019/15xxx/CVE-2019-15878.json new file mode 100644 index 00000000000..daf19f96b5a --- /dev/null +++ b/2019/15xxx/CVE-2019-15878.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15878", + "ASSIGNER": "secteam@freebsd.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "FreeBSD", + "version": { + "version_data": [ + { + "version_value": "FreeBSD 11.3-RELEASE before p9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:14.sctp.asc" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15879.json b/2019/15xxx/CVE-2019-15879.json new file mode 100644 index 00000000000..e00ad3b7f45 --- /dev/null +++ b/2019/15xxx/CVE-2019-15879.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15879", + "ASSIGNER": "secteam@freebsd.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "FreeBSD", + "version": { + "version_data": [ + { + "version_value": "FreeBSD 12.1-RELEASE before p5, and 11.3-RELEASE before p9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:15.cryptodev.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:15.cryptodev.asc" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory." + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15880.json b/2019/15xxx/CVE-2019-15880.json new file mode 100644 index 00000000000..3fe0566d834 --- /dev/null +++ b/2019/15xxx/CVE-2019-15880.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15880", + "ASSIGNER": "secteam@freebsd.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "FreeBSD", + "version": { + "version_data": [ + { + "version_value": "FreeBSD 12.1-RELEASE before p5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use after free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:16.cryptodev.asc" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9682.json b/2019/9xxx/CVE-2019-9682.json index 6723e61e6d6..63a6d4b98fd 100644 --- a/2019/9xxx/CVE-2019-9682.json +++ b/2019/9xxx/CVE-2019-9682.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-9682", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9682", + "ASSIGNER": "cybersecurity@dahuatech.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HDBW1320E-W", + "version": { + "version_data": [ + { + "version_value": "Versions which Build time before December,2019" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Replay Attacks" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.dahuasecurity.com/support/cybersecurity/details/767", + "url": "https://www.dahuasecurity.com/support/cybersecurity/details/767" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method." } ] } diff --git a/2020/5xxx/CVE-2020-5838.json b/2020/5xxx/CVE-2020-5838.json index 39c5a4ad270..1cee1c8b927 100644 --- a/2020/5xxx/CVE-2020-5838.json +++ b/2020/5xxx/CVE-2020-5838.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-5838", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@symantec.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "IT Analytics", + "version": { + "version_data": [ + { + "version_value": "Prior to 2.9.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1766", + "url": "https://support.broadcom.com/security-advisory/security-advisory-detail.html?notificationId=SYMSA1766" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Symantec IT Analytics, prior to 2.9.1, may be susceptible to a cross-site scripting (XSS) exploit, which is a type of issue that can potentially enable attackers to inject client-side scripts into web pages viewed by other users." } ] } diff --git a/2020/7xxx/CVE-2020-7454.json b/2020/7xxx/CVE-2020-7454.json index ade7d2d9f20..5690e317d9d 100644 --- a/2020/7xxx/CVE-2020-7454.json +++ b/2020/7xxx/CVE-2020-7454.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-7454", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secteam@freebsd.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "FreeBSD", + "version": { + "version_data": [ + { + "version_value": "FreeBSD 12.1-RELEASE before p5, 11.4-BETA1 before p1, and 11.3-RELEASE before p9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read/write" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:12.libalias.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:12.libalias.asc" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In FreeBSD 12.1-STABLE before r360971, 12.1-RELEASE before p5, 11.4-STABLE before r360971, 11.4-BETA1 before p1 and 11.3-RELEASE before p9, libalias does not properly validate packet length resulting in modules causing an out of bounds read/write condition if no checking was built into the module." } ] } diff --git a/2020/7xxx/CVE-2020-7455.json b/2020/7xxx/CVE-2020-7455.json index ac712d7254f..81f49e93268 100644 --- a/2020/7xxx/CVE-2020-7455.json +++ b/2020/7xxx/CVE-2020-7455.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-7455", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secteam@freebsd.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "FreeBSD", + "version": { + "version_data": [ + { + "version_value": "FreeBSD 12.1-RELEASE before p5, 11.4-BETA1 before p1, and 11.3-RELEASE before p9" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-bounds read" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:13.libalias.asc", + "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:13.libalias.asc" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In FreeBSD 12.1-STABLE before r360973, 12.1-RELEASE before p5, 11.4-STABLE before r360973, 11.4-BETA1 before p1 and 11.3-RELEASE before p9, the FTP packet handler in libalias incorrectly calculates some packet length allowing disclosure of small amounts of kernel (for kernel NAT) or natd process space (for userspace natd)." } ] } diff --git a/2020/9xxx/CVE-2020-9501.json b/2020/9xxx/CVE-2020-9501.json index 5c6835d62b5..439f3054db8 100644 --- a/2020/9xxx/CVE-2020-9501.json +++ b/2020/9xxx/CVE-2020-9501.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9501", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@dahuatech.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Web P2P control,P2P plartform server,client tools", + "version": { + "version_data": [ + { + "version_value": "Versions which Build time before April,2020" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information leakage" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.dahuasecurity.com/support/cybersecurity/details/757", + "url": "https://www.dahuasecurity.com/support/cybersecurity/details/757" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected." } ] } diff --git a/2020/9xxx/CVE-2020-9502.json b/2020/9xxx/CVE-2020-9502.json index 560fb69d053..9f718cf3c83 100644 --- a/2020/9xxx/CVE-2020-9502.json +++ b/2020/9xxx/CVE-2020-9502.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-9502", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cybersecurity@dahuatech.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "IPC-HX2XXX Series,IPC-HXXX5X4X Series,IPC-HX5842H,IPC-HX7842H,NVR 5x Series,NVR 4x Series,SD6AL Series,SD5A Series,SD1A Series,PTZ1A Series,SD50/52C Series,IPC-HFW1431S", + "version": { + "version_data": [ + { + "version_value": "Versions which Build time before December,2019" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Session hijacking" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.dahuasecurity.com/support/cybersecurity/details/777", + "url": "https://www.dahuasecurity.com/support/cybersecurity/details/777" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device." } ] }