"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-07-06 22:01:22 +00:00
parent 490983f5b1
commit 835309e6f8
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 81 additions and 7 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. Python 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 are believed to be vulnerable."
"value": "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15."
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2020-10760.html",
"url": "https://www.samba.org/samba/security/CVE-2020-10760.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4409-1",
"url": "https://usn.ubuntu.com/4409-1/"
}
]
},

View File

@ -61,6 +61,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200630 [SECURITY] [DLA 2265-1] mailman security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00036.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4406-1",
"url": "https://usn.ubuntu.com/4406-1/"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9395",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-9395",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF devices before 2.0.6. A stack-based buffer overflow exists in the client code that takes care of WPA2's 4-way-handshake via a malformed EAPOL-Key packet with a long keydata buffer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/ambiot/amb1_arduino/commit/dcea55cf9775a0166805b3db845b237ecd5e74ea#diff-d06e7a87f34cc464a56799a419033014",
"url": "https://github.com/ambiot/amb1_arduino/commit/dcea55cf9775a0166805b3db845b237ecd5e74ea#diff-d06e7a87f34cc464a56799a419033014"
},
{
"refsource": "MISC",
"name": "https://github.com/ambiot/amb1_sdk/commit/bc5173d5d4faf6829074b0f1e1b242c12b7777a3#diff-700c216fb376666eaeda0c892e8bdc09",
"url": "https://github.com/ambiot/amb1_sdk/commit/bc5173d5d4faf6829074b0f1e1b242c12b7777a3#diff-700c216fb376666eaeda0c892e8bdc09"
},
{
"refsource": "MISC",
"name": "https://www.amebaiot.com/en/arduino-faq/",
"url": "https://www.amebaiot.com/en/arduino-faq/"
}
]
}

View File

@ -63,6 +63,11 @@
"refsource": "MLIST",
"name": "[guacamole-user] 20200703 RE: [SECURITY] CVE-2020-9497: Apache Guacamole: Improper input validation of RDP static virtual channels",
"url": "https://lists.apache.org/thread.html/r181b1d5b1acb31cfa69f41b2c86ed3a2cb0b5bc09c2cbd31e9e7c847@%3Cuser.guacamole.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://research.checkpoint.com/2020/apache-guacamole-rce/",
"url": "https://research.checkpoint.com/2020/apache-guacamole-rce/"
}
]
},

View File

@ -53,6 +53,11 @@
"refsource": "MLIST",
"name": "[announce] 20200701 [SECURITY] CVE-2020-9498: Apache Guacamole: Dangling pointer in RDP static virtual channel handling",
"url": "https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc@%3Cannounce.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://research.checkpoint.com/2020/apache-guacamole-rce/",
"url": "https://research.checkpoint.com/2020/apache-guacamole-rce/"
}
]
},