2023-09-25 18:00:31 +00:00
{
"id" : "CVE-2023-32653" ,
"sourceIdentifier" : "talos-cna@cisco.com" ,
"published" : "2023-09-25T16:15:13.880" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:03:46.810" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-09-25 18:00:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An out-of-bounds write vulnerability exists in the dcm_pixel_data_decode functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability."
2023-09-26 18:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de escritura fuera de l\u00edmites en la funcionalidad dcm_pixel_data_decode de Accusoft ImageGear 20.1. Un archivo con formato incorrecto especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Una v\u00edctima necesitar\u00eda abrir un archivo malicioso para activar esta vulnerabilidad."
2023-09-25 18:00:31 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-09-26 18:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "talos-cna@cisco.com" ,
"type" : "Secondary" ,
2023-09-26 18:00:29 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-09-26 18:00:29 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "NONE" ,
2023-09-26 18:00:29 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-09-26 18:00:29 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 3.9 ,
2023-09-26 18:00:29 +00:00
"impactScore" : 5.9
} ,
2023-09-25 18:00:31 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-09-25 18:00:31 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-09-25 18:00:31 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "REQUIRED" ,
2023-09-25 18:00:31 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-09-25 18:00:31 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.8 ,
2023-09-25 18:00:31 +00:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2023-09-26 18:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "talos-cna@cisco.com" ,
"type" : "Secondary" ,
2023-09-26 18:00:29 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-191"
2023-09-26 18:00:29 +00:00
}
]
} ,
2023-09-25 18:00:31 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-09-25 18:00:31 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-787"
2023-09-25 18:00:31 +00:00
}
]
}
] ,
2023-09-26 18:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:accusoft:imagegear:20.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D503BC72-1F75-41FB-8CCF-ABFC640C3CC0"
}
]
}
]
}
] ,
2023-09-25 18:00:31 +00:00
"references" : [
{
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802" ,
2023-09-26 18:00:29 +00:00
"source" : "talos-cna@cisco.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-09-25 18:00:31 +00:00
}
]
}