diff --git a/2021/34xxx/CVE-2021-34986.json b/2021/34xxx/CVE-2021-34986.json index 56a31fbb4d6..9f2a1677cbb 100644 --- a/2021/34xxx/CVE-2021-34986.json +++ b/2021/34xxx/CVE-2021-34986.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2021-34986", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Desktop", - "version": { - "version_data": [ - { - "version_value": "16.5.0 (49183)" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-34986", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Desktop", + "version": { + "version_data": [ + { + "version_value": "16.5.0 (49183)" + } + ] + } + } + ] + }, + "vendor_name": "Parallels" } - } ] - }, - "vendor_name": "Parallels" } - ] - } - }, - "credit": "say2", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition" - } + }, + "credit": "say2", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-385/" - }, - { - "url": "https://kb.parallels.com/en/125013" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.parallels.com/en/125013", + "refsource": "MISC", + "name": "https://kb.parallels.com/en/125013" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-385/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-385/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2021/34xxx/CVE-2021-34987.json b/2021/34xxx/CVE-2021-34987.json index 9ad7827376e..e613a623077 100644 --- a/2021/34xxx/CVE-2021-34987.json +++ b/2021/34xxx/CVE-2021-34987.json @@ -1,70 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "zdi-disclosures@trendmicro.com", - "ID": "CVE-2021-34987", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Desktop", - "version": { - "version_data": [ - { - "version_value": "16.5.1 (49187)" - } - ] + "CVE_data_meta": { + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "ID": "CVE-2021-34987", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Desktop", + "version": { + "version_data": [ + { + "version_value": "16.5.1 (49187)" + } + ] + } + } + ] + }, + "vendor_name": "Parallels" } - } ] - }, - "vendor_name": "Parallels" } - ] - } - }, - "credit": "Ben McBride", - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.1 (49187). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability.\n\nThe specific flaw exists within the HDAudio virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-14969." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')" - } + }, + "credit": "Ben McBride", + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.1 (49187). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the HDAudio virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-14969." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-386/" - }, - { - "url": "https://kb.parallels.com/en/125013" - } - ] - }, - "impact": { - "cvss": { - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", - "version": "3.0" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://kb.parallels.com/en/125013", + "refsource": "MISC", + "name": "https://kb.parallels.com/en/125013" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-386/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-386/" + } + ] + }, + "impact": { + "cvss": { + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } - } -} +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30634.json b/2022/30xxx/CVE-2022-30634.json index 32ddd38e9d2..ddecacea41e 100644 --- a/2022/30xxx/CVE-2022-30634.json +++ b/2022/30xxx/CVE-2022-30634.json @@ -1,17 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security@golang.org", "ID": "CVE-2022-30634", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "Credit": { + "credit_data": { + "description": {} + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "crypto/rand", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.17.11" + }, + { + "version_affected": ">=", + "version_value": "1.18.0" + }, + { + "version_affected": "<", + "version_value": "1.18.3" + } + ] + } + } + ] + }, + "vendor_name": "Go" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Davis Goodin and Quim Muntal of Microsoft" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://go.dev/cl/402257", + "name": "https://go.dev/cl/402257" + }, + { + "refsource": "MISC", + "url": "https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863", + "name": "https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863" + }, + { + "refsource": "MISC", + "url": "https://go.dev/issue/52561", + "name": "https://go.dev/issue/52561" + }, + { + "refsource": "MISC", + "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ", + "name": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ" } ] } diff --git a/2022/35xxx/CVE-2022-35888.json b/2022/35xxx/CVE-2022-35888.json new file mode 100644 index 00000000000..e6974791cbb --- /dev/null +++ b/2022/35xxx/CVE-2022-35888.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-35888", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/35xxx/CVE-2022-35889.json b/2022/35xxx/CVE-2022-35889.json new file mode 100644 index 00000000000..b4ef03bdf51 --- /dev/null +++ b/2022/35xxx/CVE-2022-35889.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-35889", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file