64 lines
2.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-45591",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2024-03-05T12:15:45.833",
"lastModified": "2024-11-21T08:27:01.167",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CWE-122 \u201cHeap-based Buffer Overflow\u201d vulnerability in the \u201clogger_generic\u201d function of the \u201cAx_rtu\u201d binary allows a remote authenticated attacker to trigger a memory corruption in the context of the binary. This may result in a Denial-of-Service (DoS) condition, possibly in the execution of arbitrary code with the same privileges of the process (root), or have other unspecified impacts on the device. This issue affects: AiLux imx6 bundle below version imx6_1.0.7-2."
},
{
"lang": "es",
"value": "Una vulnerabilidad CWE-122 de \u201cdesbordamiento de b\u00fafer de almacenamiento din\u00e1mico\u201d en la funci\u00f3n \u201clogger_generic\u201d del binario \u201cAx_rtu\u201d permite que un atacante remoto autenticado desencadene una corrupci\u00f3n de memoria en el contexto del binario. Esto puede resultar en una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS), posiblemente en la ejecuci\u00f3n de c\u00f3digo arbitrario con los mismos privilegios del proceso (ra\u00edz), o tener otros impactos no especificados en el dispositivo. Este problema afecta: Paquete AiLux imx6 inferior a la versi\u00f3n imx6_1.0.7-2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45591",
"source": "prodsec@nozominetworks.com"
},
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-45591",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}