mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
144 lines
5.1 KiB
JSON
144 lines
5.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@php.net",
|
|
"DATE_PUBLIC": "2021-06-21T11:41:00.000Z",
|
|
"ID": "CVE-2021-21704",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Multiple vulnerabilities in Firebird client extension"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "PHP",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "7.3.x",
|
|
"version_value": "7.3.29"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "7.4.x",
|
|
"version_value": "7.4.21"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "8.0.X",
|
|
"version_value": "8.0.8"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "PHP Group"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "reported by trichimtrich at gmail dot com"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-125 Out-of-bounds Read"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-190 Integer Overflow or Wraparound"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://bugs.php.net/bug.php?id=76448",
|
|
"name": "https://bugs.php.net/bug.php?id=76448"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://bugs.php.net/bug.php?id=76449",
|
|
"name": "https://bugs.php.net/bug.php?id=76449"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://bugs.php.net/bug.php?id=76450",
|
|
"name": "https://bugs.php.net/bug.php?id=76450"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://bugs.php.net/bug.php?id=76452",
|
|
"name": "https://bugs.php.net/bug.php?id=76452"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20211029-0006/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20211029-0006/"
|
|
},
|
|
{
|
|
"refsource": "GENTOO",
|
|
"name": "GLSA-202209-20",
|
|
"url": "https://security.gentoo.org/glsa/202209-20"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"defect": [
|
|
"https://bugs.php.net/bug.php?id=76448",
|
|
"https://bugs.php.net/bug.php?id=76449",
|
|
"https://bugs.php.net/bug.php?id=76450",
|
|
"https://bugs.php.net/bug.php?id=76452",
|
|
""
|
|
],
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |