From 5da55b541dc8c9806d26ec3e7657dadd8601bfe7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 19 Dec 2018 10:28:27 -0500 Subject: [PATCH] - Added submissions from Kaspersky from 2018-12-19. --- 2018/15xxx/CVE-2018-15126.json | 48 +++++++++++++++++++++++++++++++--- 2018/15xxx/CVE-2018-15127.json | 48 +++++++++++++++++++++++++++++++--- 2018/20xxx/CVE-2018-20019.json | 48 +++++++++++++++++++++++++++++++--- 2018/20xxx/CVE-2018-20020.json | 48 +++++++++++++++++++++++++++++++--- 2018/20xxx/CVE-2018-20021.json | 48 +++++++++++++++++++++++++++++++--- 2018/20xxx/CVE-2018-20022.json | 48 +++++++++++++++++++++++++++++++--- 2018/20xxx/CVE-2018-20023.json | 48 +++++++++++++++++++++++++++++++--- 2018/20xxx/CVE-2018-20024.json | 48 +++++++++++++++++++++++++++++++--- 2018/6xxx/CVE-2018-6307.json | 48 +++++++++++++++++++++++++++++++--- 9 files changed, 405 insertions(+), 27 deletions(-) diff --git a/2018/15xxx/CVE-2018-15126.json b/2018/15xxx/CVE-2018-15126.json index fe685fb4be7..7383128c928 100644 --- a/2018/15xxx/CVE-2018-15126.json +++ b/2018/15xxx/CVE-2018-15126.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-15126", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit 73cb96fec028a576a5a24417b57723b55854ad7b" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Heap Use-After-Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-027-libvnc-heap-use-after-free/" } ] } diff --git a/2018/15xxx/CVE-2018-15127.json b/2018/15xxx/CVE-2018-15127.json index 5410f60e56a..dc1389c2558 100644 --- a/2018/15xxx/CVE-2018-15127.json +++ b/2018/15xxx/CVE-2018-15127.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-15127", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit 502821828ed00b4a2c4bef90683d0fd88ce495de" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Heap Out-of-Bound write" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/" } ] } diff --git a/2018/20xxx/CVE-2018-20019.json b/2018/20xxx/CVE-2018-20019.json index 632d86a42ba..48963bf3aa8 100644 --- a/2018/20xxx/CVE-2018-20019.json +++ b/2018/20xxx/CVE-2018-20019.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-20019", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Multiple Heap Out-of-Bound" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/" } ] } diff --git a/2018/20xxx/CVE-2018-20020.json b/2018/20xxx/CVE-2018-20020.json index df078777a3d..853440a8696 100644 --- a/2018/20xxx/CVE-2018-20020.json +++ b/2018/20xxx/CVE-2018-20020.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-20020", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Heap Out-of-Bound write" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/" } ] } diff --git a/2018/20xxx/CVE-2018-20021.json b/2018/20xxx/CVE-2018-20021.json index 8e93750f3fe..1a259d72d7f 100644 --- a/2018/20xxx/CVE-2018-20021.json +++ b/2018/20xxx/CVE-2018-20021.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-20021", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Denial of Service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/" } ] } diff --git a/2018/20xxx/CVE-2018-20022.json b/2018/20xxx/CVE-2018-20022.json index 61157e4570a..64a9d87d283 100644 --- a/2018/20xxx/CVE-2018-20022.json +++ b/2018/20xxx/CVE-2018-20022.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-20022", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/" } ] } diff --git a/2018/20xxx/CVE-2018-20023.json b/2018/20xxx/CVE-2018-20023.json index f7b838487f8..ba061fa6d60 100644 --- a/2018/20xxx/CVE-2018-20023.json +++ b/2018/20xxx/CVE-2018-20023.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-20023", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit 8b06f835e259652b0ff026898014fc7297ade858" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR" + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/" } ] } diff --git a/2018/20xxx/CVE-2018-20024.json b/2018/20xxx/CVE-2018-20024.json index cb4fbcb4a56..9f36c01a0b9 100644 --- a/2018/20xxx/CVE-2018-20024.json +++ b/2018/20xxx/CVE-2018-20024.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-20024", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Denial of Service" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/" } ] } diff --git a/2018/6xxx/CVE-2018-6307.json b/2018/6xxx/CVE-2018-6307.json index ca1feab19ca..229db5645b4 100644 --- a/2018/6xxx/CVE-2018-6307.json +++ b/2018/6xxx/CVE-2018-6307.json @@ -1,8 +1,31 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "vulnerability@kaspersky.com", "ID" : "CVE-2018-6307", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "LibVNC", + "version" : { + "version_data" : [ + { + "version_value" : "commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,26 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Heap Use-After-Free" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-026-libvnc-heap-use-after-free/" } ] }