From fb359aa11cbdf9a5df0e7113aaa0ff405a768b72 Mon Sep 17 00:00:00 2001 From: swpsirt Date: Thu, 2 Mar 2023 13:14:46 -0800 Subject: [PATCH] CVE Submission SonicWall CVE-2023-0656 CVE-2023-1101 submission. --- 2023/0xxx/CVE-2023-0656.json | 80 +++++++++++++++++++++++++++------- 2023/1xxx/CVE-2023-1101.json | 83 +++++++++++++++++++++++++++++------- 2 files changed, 133 insertions(+), 30 deletions(-) diff --git a/2023/0xxx/CVE-2023-0656.json b/2023/0xxx/CVE-2023-0656.json index e8e1c481cbf..c6f97af3772 100644 --- a/2023/0xxx/CVE-2023-0656.json +++ b/2023/0xxx/CVE-2023-0656.json @@ -1,18 +1,68 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2023-0656", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "PSIRT@sonicwall.com", + "ID": "CVE-2023-0656", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SonicOS", + "version": { + "version_data": [ + { + "version_value": "SonicOS NSv 6.5.4.4-44v-21-1551 and earlier" + }, + { + "version_value": "SonicOS NSsp 7.0.1-5083 and earlier" + }, + { + "version_value": "SonicOS 7.0.1-5095 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" + } + ] } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004" + } + ] + } } \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1101.json b/2023/1xxx/CVE-2023-1101.json index e8b1054142f..63988291b5b 100644 --- a/2023/1xxx/CVE-2023-1101.json +++ b/2023/1xxx/CVE-2023-1101.json @@ -1,18 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2023-1101", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "PSIRT@sonicwall.com", + "ID": "CVE-2023-1101", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SonicOS", + "version": { + "version_data": [ + { + "version_value": "SonicOS 6.5.4.11-97n and earlier" + }, + { + "version_value": "SonicOS NSv 6.5.4.4-44v-21-1551 and earlier" + }, + { + "version_value": "SonicOS NSsp 7.0.1-5083 and earlier" + }, + { + "version_value": "SonicOS 7.0.1-5095 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "SonicWall" + } + ] } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-307: Improper Restriction of Excessive Authentication Attempts" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005", + "refsource": "CONFIRM", + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005" + } + ] + } } \ No newline at end of file