"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-12-29 03:18:38 +00:00
parent ea150ba669
commit f53923f473
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
5 changed files with 280 additions and 59 deletions

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "An authenticated attacker can exploit an Untrusted Search Path vulnerability in Microsoft Dataverse to execute code over a network.\n"
"value": "An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network."
}
]
},

View File

@ -40,8 +40,8 @@
"version_data": [
{
"version_affected": "<",
"version_name": "604326b41a6f",
"version_value": "f7990498b05a"
"version_name": "604326b41a6fb9b4a78b6179335decee0365cd8c",
"version_value": "f7990498b05ac41f7d6a190dc0418ef1d21bf058"
},
{
"version_value": "not down converted",
@ -87,12 +87,6 @@
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.6.48",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.8.5",
"lessThanOrEqual": "6.8.*",
@ -145,11 +139,6 @@
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/668b3074aa14829e2ac2759799537a93b60fef86"
},
{
"url": "https://git.kernel.org/stable/c/913c30f827e17d8cda1da6eeb990f350d36cb69b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/913c30f827e17d8cda1da6eeb990f350d36cb69b"
},
{
"url": "https://git.kernel.org/stable/c/6af057ccdd8e7619960aca1f0428339f213b31cd",
"refsource": "MISC",
@ -163,6 +152,6 @@
]
},
"generator": {
"engine": "bippy-9e1c9544281a"
"engine": "bippy-5f407fcff5a0"
}
}

View File

@ -40,8 +40,8 @@
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "4949affd5288"
"version_name": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"version_value": "4949affd5288b867cdf115f5b08d6166b2027f87"
},
{
"version_value": "not down converted",
@ -59,12 +59,6 @@
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15.159",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.1.90",
"lessThanOrEqual": "6.1.*",
@ -114,11 +108,6 @@
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b54c4632946ae42f2b39ed38abd909bbf78cbcc2"
},
{
"url": "https://git.kernel.org/stable/c/6dfd79ed04c578f1d9a9a41ba5b2015cf9f03fc3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6dfd79ed04c578f1d9a9a41ba5b2015cf9f03fc3"
},
{
"url": "https://git.kernel.org/stable/c/01fc53be672acae37e611c80cc0b4f3939584de3",
"refsource": "MISC",
@ -142,6 +131,6 @@
]
},
"generator": {
"engine": "bippy-9e1c9544281a"
"engine": "bippy-5f407fcff5a0"
}
}

View File

@ -40,8 +40,8 @@
"version_data": [
{
"version_affected": "<",
"version_name": "d30a2605be9d",
"version_value": "8a26198186e9"
"version_name": "d30a2605be9d5132d95944916e8f578fcfe4f976",
"version_value": "8a26198186e97ee5fc4b42fde82629cff8c75cd6"
},
{
"version_value": "not down converted",
@ -80,18 +80,6 @@
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
},
{
"version": "6.10.14",
"lessThanOrEqual": "6.10.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.11.3",
"lessThanOrEqual": "6.11.*",
"status": "unaffected",
"versionType": "semver"
}
],
"defaultStatus": "affected"
@ -127,20 +115,10 @@
"url": "https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155"
},
{
"url": "https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa"
},
{
"url": "https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d"
}
]
},
"generator": {
"engine": "bippy-8e903de6a542"
"engine": "bippy-5f407fcff5a0"
}
}

View File

@ -1,18 +1,283 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-3393",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@paloaltonetworks.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"cweId": "CWE-754"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Palo Alto Networks",
"product": {
"product_data": [
{
"product_name": "Cloud NGFW",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "All"
}
],
"defaultStatus": "unaffected"
}
}
]
}
},
{
"product_name": "PAN-OS",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "11.2.3",
"status": "unaffected"
}
],
"lessThan": "11.2.3",
"status": "affected",
"version": "11.2.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "11.1.2-h16",
"status": "unaffected"
},
{
"at": "11.1.3-h13",
"status": "unaffected"
},
{
"at": "11.1.4-h7",
"status": "unaffected"
},
{
"at": "11.1.5",
"status": "unaffected"
}
],
"lessThan": "11.1.2-h16",
"status": "affected",
"version": "11.1.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "10.2.8-h19",
"status": "unaffected"
},
{
"at": "10.2.9-h19",
"status": "unaffected"
},
{
"at": "10.2.10-h12",
"status": "unaffected"
},
{
"at": "10.2.11-h10",
"status": "unaffected"
},
{
"at": "10.2.12-h4",
"status": "unaffected"
},
{
"at": "10.2.13-h2",
"status": "unaffected"
},
{
"at": "10.2.14",
"status": "unaffected"
}
],
"lessThan": "10.2.8-h19",
"status": "affected",
"version": "10.2.8",
"versionType": "custom"
},
{
"changes": [
{
"at": "10.1.14-h8",
"status": "unaffected"
},
{
"at": "10.1.15",
"status": "unaffected"
}
],
"lessThan": "10.1.14-h8",
"status": "affected",
"version": "10.1.14",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "10.2.8",
"status": "affected"
},
{
"at": "10.2.9-h19",
"status": "unaffected"
},
{
"at": "10.2.10-h12",
"status": "unaffected"
}
],
"lessThan": "10.2.8",
"status": "unaffected",
"version": "10.2.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "11.2.3",
"status": "unaffected"
}
],
"lessThan": "11.2.3",
"status": "affected",
"version": "11.2.0",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://security.paloaltonetworks.com/CVE-2024-3393",
"refsource": "MISC",
"name": "https://security.paloaltonetworks.com/CVE-2024-3393"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"defect": [
"PAN-259351",
"PAN-219034"
],
"discovery": "USER"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>Both of the following must be true for PAN-OS software to be affected:<br></p><ol><li>Either a DNS Security License or an Advanced DNS Security License must be applied, AND<br></li><li>DNS Security logging must be enabled.</li></ol>"
}
],
"value": "Both of the following must be true for PAN-OS software to be affected:\n\n\n * Either a DNS Security License or an Advanced DNS Security License must be applied, AND\n\n * DNS Security logging must be enabled."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "If your firewall running the vulnerable PAN-OS versions stops responding or reboots unexpectedly and you cannot immediately apply a fix, apply a workaround below based on your deployment.<br><br><b>Unmanaged NGFWs, NGFW managed by Panorama, or Prisma Access managed by Panorama</b><b><br></b><ol><li>For each Anti-spyware profile, navigate to Objects \u2192 Security Profiles \u2192 Anti-spyware \u2192 (select a profile) \u2192 DNS Policies \u2192 DNS Security.</li><li>Change the Log Severity to \"none\" for all configured DNS Security categories.<br></li><li>Commit the changes.<br></li></ol>Remember to revert the Log Severity settings once the fixes are applied.<br><br><b>NGFW managed by Strata Cloud Manager (SCM)</b><br><br><div><div>You can choose one of the following mitigation options:</div><div><ol><li>Option 1: Disable DNS Security logging directly on each NGFW by following the PAN-OS steps above.</li><li>Option 2: Disable DNS Security logging across all NGFWs in your tenant by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>.</li></ol></div><b><p>Prisma Access managed by Strata Cloud Manager (SCM)</p></b></div><p>Until we perform an upgrade of your Prisma Access tenant, you can disable DNS Security logging across all NGFWs in your tenant by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>. If you would like to expedite the upgrade, please make a note of that in the support case.</p><b></b>"
}
],
"value": "If your firewall running the vulnerable PAN-OS versions stops responding or reboots unexpectedly and you cannot immediately apply a fix, apply a workaround below based on your deployment.\n\nUnmanaged NGFWs, NGFW managed by Panorama, or Prisma Access managed by Panorama\n * For each Anti-spyware profile, navigate to Objects \u2192 Security Profiles \u2192 Anti-spyware \u2192 (select a profile) \u2192 DNS Policies \u2192 DNS Security.\n * Change the Log Severity to \"none\" for all configured DNS Security categories.\n\n * Commit the changes.\n\nRemember to revert the Log Severity settings once the fixes are applied.\n\nNGFW managed by Strata Cloud Manager (SCM)\n\nYou can choose one of the following mitigation options:\n\n * Option 1: Disable DNS Security logging directly on each NGFW by following the PAN-OS steps above.\n * Option 2: Disable DNS Security logging across all NGFWs in your tenant by opening a support case https://support.paloaltonetworks.com/Support/Index .\n\n\nPrisma Access managed by Strata Cloud Manager (SCM)\n\n\n\nUntil we perform an upgrade of your Prisma Access tenant, you can disable DNS Security logging across all NGFWs in your tenant by opening a support case https://support.paloaltonetworks.com/Support/Index . If you would like to expedite the upgrade, please make a note of that in the support case."
}
],
"exploit": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue."
}
],
"value": "Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue."
}
],
"solution": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p><span>This issue is fixed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.</span></p><p><span>Note: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release.</span></p><p><span>Prisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\"><span>support case</span></a><span>.</span></p><p><span><span>In addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.</span></span></p><p>\u200b\u200bAdditional PAN-OS 11.1 fixes:</p><div><ul><li>11.1.2-h16</li><li>11.1.3-h13</li><li>11.1.4-h7</li><li>11.1.5</li></ul></div><div>Additional PAN-OS 10.2 fixes:</div><div><ul><li>10.2.8-h19</li><li>10.2.9-h19</li><li>10.2.10-h12</li><li>10.2.11-h10</li><li>10.2.12-h4</li><li>10.2.13-h2</li><li>10.2.14</li></ul></div><div>Additional PAN-OS 10.1 fixes:</div><div><ul><li>10.1.14-h8</li><li>10.1.15</li></ul></div><div>Additional PAN-OS fixes only applicable to Prisma Access:</div><div><ul><li>10.2.9-h19</li><li>10.2.10-h12</li></ul></div>"
}
],
"value": "This issue is fixed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.\n\nNote: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release.\n\nPrisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a support case https://support.paloaltonetworks.com/Support/Index .\n\nIn addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.\n\n\u200b\u200bAdditional PAN-OS 11.1 fixes:\n\n * 11.1.2-h16\n * 11.1.3-h13\n * 11.1.4-h7\n * 11.1.5\n\n\n\n\nAdditional PAN-OS 10.2 fixes:\n\n * 10.2.8-h19\n * 10.2.9-h19\n * 10.2.10-h12\n * 10.2.11-h10\n * 10.2.12-h4\n * 10.2.13-h2\n * 10.2.14\n\n\n\n\nAdditional PAN-OS 10.1 fixes:\n\n * 10.1.14-h8\n * 10.1.15\n\n\n\n\nAdditional PAN-OS fixes only applicable to Prisma Access:\n\n * 10.2.9-h19\n * 10.2.10-h12"
}
],
"credits": [
{
"lang": "en",
"value": "Palo Alto Networks thanks the CERT-EE team for their extra effort in providing invaluable forensic and analytic assistance."
}
]
}