2023-12-18 17:00:28 +00:00
{
"id" : "CVE-2023-4320" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2023-12-18T14:15:09.830" ,
2024-04-25 16:03:31 +00:00
"lastModified" : "2024-04-25T14:15:09.280" ,
2024-01-03 13:00:28 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-18 17:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity."
2023-12-29 23:00:27 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se encontr\u00f3 una falla de desbordamiento aritm\u00e9tico en Satellite al crear un nuevo token de acceso personal. Esta falla permite a un atacante que utiliza este desbordamiento aritm\u00e9tico crear tokens de acceso personal que son v\u00e1lidos indefinidamente, lo que da\u00f1a la integridad del sistema."
2023-12-18 17:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-29 23:00:27 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
} ,
2023-12-18 17:00:28 +00:00
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
2024-01-03 13:00:28 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" ,
2023-12-18 17:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2024-01-03 13:00:28 +00:00
"privilegesRequired" : "LOW" ,
2023-12-18 17:00:28 +00:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "LOW" ,
2024-01-03 13:00:28 +00:00
"baseScore" : 7.6 ,
"baseSeverity" : "HIGH"
2023-12-18 17:00:28 +00:00
} ,
2024-01-03 13:00:28 +00:00
"exploitabilityScore" : 2.8 ,
2023-12-18 17:00:28 +00:00
"impactScore" : 4.7
}
]
} ,
"weaknesses" : [
2023-12-29 23:00:27 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-613"
}
]
} ,
2023-12-18 17:00:28 +00:00
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-613"
}
]
}
] ,
2023-12-29 23:00:27 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.13" ,
"matchCriteriaId" : "483E41DC-50A4-4584-9338-DFB432991501"
}
]
}
]
}
] ,
2023-12-18 17:00:28 +00:00
"references" : [
2024-04-25 16:03:31 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2010" ,
"source" : "secalert@redhat.com"
} ,
2023-12-18 17:00:28 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2023-4320" ,
2023-12-29 23:00:27 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
2023-12-18 17:00:28 +00:00
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2231814" ,
2023-12-29 23:00:27 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Issue Tracking"
]
2023-12-18 17:00:28 +00:00
}
]
}