"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-09-19 05:00:38 +00:00
parent d6dc1ec88e
commit 627c779646
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
22 changed files with 220 additions and 34 deletions

View File

@ -61,6 +61,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2023-bf8423a373",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZD2AJTU4PCJQP7HPTS2L2ELJWBASCRGD/"
},
{
"refsource": "DEBIAN",
"name": "DSA-5500",
"url": "https://www.debian.org/security/2023/dsa-5500"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in audin_send_open() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a buffer over flow in audin_send_open() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hqw2-jx2c-wrr2",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hqw2-jx2c-wrr2"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Write in xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a Out of Bound Write in xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2f49-wwpm-78pj",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2f49-wwpm-78pj"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-pgx2-3fjj-fqqh",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-pgx2-3fjj-fqqh"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in devredir_proc_client_devlist_announce_req() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a buffer over flow in devredir_proc_client_devlist_announce_req() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-3jmx-f6hv-95wg",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-3jmx-f6hv-95wg"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_caps_process_confirm_active() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a Out of Bound Read in xrdp_caps_process_confirm_active() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hm75-9jcg-p7hq",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hm75-9jcg-p7hq"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Integer Overflow in xrdp_mm_process_rail_update_window_text() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a Integer Overflow in xrdp_mm_process_rail_update_window_text() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rqfx-5fv8-q9c6",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rqfx-5fv8-q9c6"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close() function. There are no known workarounds for this issue. Users are advised to upgrade."
"value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp < v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close() function. There are no known workarounds for this issue. Users are advised to upgrade."
}
]
},
@ -40,8 +40,8 @@
"version": {
"version_data": [
{
"version_value": "< 0.9.21",
"version_affected": "="
"version_affected": "=",
"version_value": "< 0.9.21"
}
]
}
@ -58,6 +58,11 @@
"url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-59wp-3wq6-jh5v",
"refsource": "MISC",
"name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-59wp-3wq6-jh5v"
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5502"
}
]
},

View File

@ -1,17 +1,98 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-26143",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Arbitrary Argument Injection",
"cweId": "CWE-88"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "blamer",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.0.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318",
"refsource": "MISC",
"name": "https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318"
},
{
"url": "https://gist.github.com/lirantal/14c3686370a86461f555d3f0703e02f9",
"refsource": "MISC",
"name": "https://gist.github.com/lirantal/14c3686370a86461f555d3f0703e02f9"
},
{
"url": "https://github.com/kucherenko/blamer/commit/0965877f115753371a2570f10a63c455d2b2cde3",
"refsource": "MISC",
"name": "https://github.com/kucherenko/blamer/commit/0965877f115753371a2570f10a63c455d2b2cde3"
}
]
},
"credits": [
{
"lang": "en",
"value": "Liran Tal"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}

View File

@ -68,6 +68,11 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"refsource": "MISC",
"name": "https://www.debian.org/security/2023/dsa-5499"
}
]
}