From 3a5451d04c1c024ddba1dc81658078a2af013d30 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 16 Oct 2024 18:00:31 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/40xxx/CVE-2022-40306.json | 7 +- 2024/10xxx/CVE-2024-10045.json | 18 +++++ 2024/9xxx/CVE-2024-9143.json | 128 +++++++++++++++++++++++++++++++-- 3 files changed, 147 insertions(+), 6 deletions(-) create mode 100644 2024/10xxx/CVE-2024-10045.json diff --git a/2022/40xxx/CVE-2022-40306.json b/2022/40xxx/CVE-2022-40306.json index 886b23e65f7..5f7568affef 100644 --- a/2022/40xxx/CVE-2022-40306.json +++ b/2022/40xxx/CVE-2022-40306.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The login form /Login in ECi Printanista Hub (formerly FMAudit Printscout) through 2022-06-27 performs expensive RSA key-generation operations, which allows attackers to cause a denial of service (DoS) by requesting that form repeatedly." + "value": "The login form /Login in ECi Printanista Hub (formerly FMAudit Printscout) before 5.5.2 (July 2023) performs expensive RSA key-generation operations, which allows attackers to cause a denial of service (DoS) by requesting that form repeatedly." } ] }, @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt", "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt" + }, + { + "refsource": "CONFIRM", + "name": "https://releasenotes.printanista.net/PrintanistaHub", + "url": "https://releasenotes.printanista.net/PrintanistaHub" } ] } diff --git a/2024/10xxx/CVE-2024-10045.json b/2024/10xxx/CVE-2024-10045.json new file mode 100644 index 00000000000..61666795755 --- /dev/null +++ b/2024/10xxx/CVE-2024-10045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-10045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/9xxx/CVE-2024-9143.json b/2024/9xxx/CVE-2024-9143.json index 9d316f39f8b..7bf164630e9 100644 --- a/2024/9xxx/CVE-2024-9143.json +++ b/2024/9xxx/CVE-2024-9143.json @@ -1,18 +1,136 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-9143", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "openssl-security@openssl.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted\nexplicit values for the field polynomial can lead to out-of-bounds memory reads\nor writes.\n\nImpact summary: Out of bound memory writes can lead to an application crash or\neven a possibility of a remote code execution, however, in all the protocols\ninvolving Elliptic Curve Cryptography that we're aware of, either only \"named\ncurves\" are supported, or, if explicit curve parameters are supported, they\nspecify an X9.62 encoding of binary (GF(2^m)) curves that can't represent\nproblematic input values. Thus the likelihood of existence of a vulnerable\napplication is low.\n\nIn particular, the X9.62 encoding is used for ECC keys in X.509 certificates,\nso problematic inputs cannot occur in the context of processing X.509\ncertificates. Any problematic use-cases would have to be using an \"exotic\"\ncurve encoding.\n\nThe affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),\nand various supporting BN_GF2m_*() functions.\n\nApplications working with \"exotic\" explicit binary (GF(2^m)) curve parameters,\nthat make it possible to represent invalid field polynomials with a zero\nconstant term, via the above or similar APIs, may terminate abruptly as a\nresult of reading or writing outside of array bounds. Remote code execution\ncannot easily be ruled out.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787 Out-of-bounds Write", + "cweId": "CWE-787" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OpenSSL", + "product": { + "product_data": [ + { + "product_name": "OpenSSL", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.3.0", + "version_value": "3.3.3" + }, + { + "version_affected": "<", + "version_name": "3.2.0", + "version_value": "3.2.4" + }, + { + "version_affected": "<", + "version_name": "3.1.0", + "version_value": "3.1.8" + }, + { + "version_affected": "<", + "version_name": "3.0.0", + "version_value": "3.0.16" + }, + { + "version_affected": "<", + "version_name": "1.1.1", + "version_value": "1.1.1zb" + }, + { + "version_affected": "<", + "version_name": "1.0.2", + "version_value": "1.0.2zl" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://openssl-library.org/news/secadv/20241016.txt", + "refsource": "MISC", + "name": "https://openssl-library.org/news/secadv/20241016.txt" + }, + { + "url": "https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4", + "refsource": "MISC", + "name": "https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4" + }, + { + "url": "https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700", + "refsource": "MISC", + "name": "https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700" + }, + { + "url": "https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154", + "refsource": "MISC", + "name": "https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154" + }, + { + "url": "https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712", + "refsource": "MISC", + "name": "https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712" + }, + { + "url": "https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a", + "refsource": "MISC", + "name": "https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a" + }, + { + "url": "https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41", + "refsource": "MISC", + "name": "https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Google OSS-Fuzz-Gen" + }, + { + "lang": "en", + "value": "Viktor Dukhovni" + } + ] } \ No newline at end of file