"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-08-15 13:00:35 +00:00
parent 3cea7325f3
commit df0bc5f341
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
10 changed files with 275 additions and 24 deletions

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6371-05bdc-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6371-05bdc-1.html"
},
{
"refsource": "MISC",
"name": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f",
"url": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f"
}
]
},

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6372-f61bc-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6372-f61bc-1.html"
},
{
"refsource": "MISC",
"name": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f",
"url": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f"
}
]
},

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6373-34d51-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6373-34d51-1.html"
},
{
"refsource": "MISC",
"name": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f",
"url": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f"
}
]
},

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-33988",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-33988",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks because the TXID value is known to the attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://sourceforge.net/projects/dproxy/",
"refsource": "MISC",
"name": "https://sourceforge.net/projects/dproxy/"
},
{
"url": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner",
"refsource": "MISC",
"name": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/14/3",
"url": "https://www.openwall.com/lists/oss-security/2022/08/14/3"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-33989",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-33989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://sourceforge.net/projects/dproxy/",
"refsource": "MISC",
"name": "https://sourceforge.net/projects/dproxy/"
},
{
"url": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner",
"refsource": "MISC",
"name": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/14/3",
"url": "https://www.openwall.com/lists/oss-security/2022/08/14/3"
}
]
}

View File

@ -1,17 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-33990",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-33990",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Misinterpretation of special domain name characters in dproxy-nexgen (aka dproxy nexgen) leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner",
"refsource": "MISC",
"name": "https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner"
},
{
"url": "https://sourceforge.net/projects/dproxy/",
"refsource": "MISC",
"name": "https://sourceforge.net/projects/dproxy/"
},
{
"url": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner",
"refsource": "MISC",
"name": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/14/3",
"url": "https://www.openwall.com/lists/oss-security/2022/08/14/3"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-33991",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2022-33991",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "dproxy-nexgen (aka dproxy nexgen) forwards and caches DNS queries with the CD (aka checking disabled) bit set to 1. This leads to disabling of DNSSEC protection provided by upstream resolvers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://sourceforge.net/projects/dproxy/",
"refsource": "MISC",
"name": "https://sourceforge.net/projects/dproxy/"
},
{
"url": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner",
"refsource": "MISC",
"name": "https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2022/08/14/3",
"url": "https://www.openwall.com/lists/oss-security/2022/08/14/3"
}
]
}

View File

@ -80,6 +80,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6374-1c6c9-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6374-1c6c9-1.html"
},
{
"refsource": "MISC",
"name": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f",
"url": "https://www.chtsecurity.com/news/48032532-b2de-401c-97a8-a2be5691988f"
}
]
},

View File

@ -79,6 +79,11 @@
"refsource": "MISC",
"url": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html",
"name": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html"
},
{
"refsource": "MISC",
"name": "https://www.chtsecurity.com/news/a381467e-74ff-4a8c-a4d3-fc86720f5400",
"url": "https://www.chtsecurity.com/news/a381467e-74ff-4a8c-a4d3-fc86720f5400"
}
]
},

View File

@ -56,6 +56,11 @@
"url": "https://forum.obsidian.md/t/possible-remote-code-execution-through-obsidian-uri-scheme/39743",
"refsource": "MISC",
"name": "https://forum.obsidian.md/t/possible-remote-code-execution-through-obsidian-uri-scheme/39743"
},
{
"refsource": "MISC",
"name": "https://www.chtsecurity.com/news/f2a1ad21-3442-495f-8b6e-f0fe433d6caa",
"url": "https://www.chtsecurity.com/news/f2a1ad21-3442-495f-8b6e-f0fe433d6caa"
}
]
},