diff --git a/2018/20xxx/CVE-2018-20578.json b/2018/20xxx/CVE-2018-20578.json new file mode 100644 index 00000000000..0890c976acd --- /dev/null +++ b/2018/20xxx/CVE-2018-20578.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20578", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in NuttX before 7.27. The function netlib_parsehttpurl() in apps/netutils/netlib/netlib_parsehttpurl.c mishandles URLs longer than hostlen bytes (in the webclient, this is set by default to 40), leading to an Infinite Loop. The attack vector is the Location header of an HTTP 3xx response." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt", + "refsource" : "MISC", + "url" : "https://bitbucket.org/nuttx/nuttx/downloads/nuttx-7_27-README.txt" + }, + { + "name" : "https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while", + "refsource" : "MISC", + "url" : "https://bitbucket.org/nuttx/nuttx/issues/119/denial-of-service-infinite-loop-while" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20579.json b/2018/20xxx/CVE-2018-20579.json new file mode 100644 index 00000000000..f63b55d6fda --- /dev/null +++ b/2018/20xxx/CVE-2018-20579.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20579", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Contiki-NG before 4.2 has a stack-based buffer overflow in the push function in os/lib/json/jsonparse.c that allows an out-of-bounds write of an '{' or '[' character." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/contiki-ng/contiki-ng/issues/601", + "refsource" : "MISC", + "url" : "https://github.com/contiki-ng/contiki-ng/issues/601" + } + ] + } +}