mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.9 KiB
JSON
82 lines
2.9 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-3515",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "libksba",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Fixed in libksba v1.6.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-190 - Integer Overflow or Wraparound"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2135610",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135610"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html",
|
|
"url": "https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b",
|
|
"url": "https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/security/cve/CVE-2022-3515",
|
|
"url": "https://access.redhat.com/security/cve/CVE-2022-3515"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://security.netapp.com/advisory/ntap-20230706-0008/",
|
|
"url": "https://security.netapp.com/advisory/ntap-20230706-0008/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment."
|
|
}
|
|
]
|
|
}
|
|
} |