From a3f7574823b2271f3c416d50e51e57776f68cff9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 Nov 2019 13:01:46 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/13xxx/CVE-2019-13623.json | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/2019/13xxx/CVE-2019-13623.json b/2019/13xxx/CVE-2019-13623.json index 8630c6f628c..a09b07432b8 100644 --- a/2019/13xxx/CVE-2019-13623.json +++ b/2019/13xxx/CVE-2019-13623.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module." + "value": "In NSA Ghidra before 9.1, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis result is archived for sharing with other persons. To achieve arbitrary code execution, one approach is to overwrite some critical Ghidra modules, e.g., the decompile module." } ] }, @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154015/Ghidra-Linux-9.0.4-Arbitrary-Code-Execution.html", "url": "http://packetstormsecurity.com/files/154015/Ghidra-Linux-9.0.4-Arbitrary-Code-Execution.html" + }, + { + "refsource": "CONFIRM", + "name": "https://ghidra-sre.org/releaseNotes_9.1_final.html", + "url": "https://ghidra-sre.org/releaseNotes_9.1_final.html" } ] }