- Synchronized data.

This commit is contained in:
CVE Team 2018-02-19 10:04:51 -05:00
parent f2745325cc
commit a40bfbc4c5
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
2 changed files with 63 additions and 3 deletions

View File

@ -55,9 +55,6 @@
"reference_data" : [
{
"url" : "https://karaf.apache.org/security/cve-2016-8750.txt"
},
{
"url" : "https://git-wip-us.apache.org/repos/asf?p=karaf.git;h=ac07cb2"
}
]
}

View File

@ -0,0 +1,63 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-7225",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "http://www.openwall.com/lists/oss-security/2018/02/18/1"
},
{
"url" : "https://github.com/LibVNC/libvncserver/issues/218"
}
]
}
}