2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2023-0751" ,
"sourceIdentifier" : "secteam@freebsd.org" ,
"published" : "2023-02-08T20:15:24.377" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T04:01:23.443" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.\n"
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
} ,
{
2024-04-04 08:46:00 +00:00
"source" : "secteam@freebsd.org" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.3:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "224B7627-CDDE-429A-852F-8A6066B501B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B6DCD8A-331E-419F-9253-C4D35C1DF54B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4578E06C-16C6-435E-9E51-91CB02602355"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "71FA1F6C-7E53-40F8-B9E1-5FD28D5DAADA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "0EC87BCE-17F0-479B-84DC-516C24FBD396"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "620C23ED-400C-438C-8427-94437F12EDAF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "24920B4D-96C0-401F-B679-BEB086760EAF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA821886-B26B-47A6-ABC9-B8F70CE0ACFB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "220629AD-32CC-4303-86AE-1DD27F0E4C65"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEEE6D52-27E4-438D-AE8D-7141320B5973"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "66364EA4-83B1-4597-8C18-D5633B361A9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF9292DD-EFB1-4B50-A941-7485D901489F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "EFB18F55-4F5C-4166-9A7E-6F6617179A90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "66E1C269-841F-489A-9A0A-5D145B417E0A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "ECF1B567-F764-45F5-A793-BEA93720F952"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "DAFE3F33-2C57-4B52-B658-82572607BD8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "C925DF75-2785-44BD-91CA-66D29C296689"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "B536EE52-ED49-4A85-BC9D-A27828D5A961"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc" ,
"source" : "secteam@freebsd.org" ,
"tags" : [
"Mitigation" ,
"Patch" ,
"Vendor Advisory"
]
}
]
}