Auto-Update: 2023-12-08T13:00:58.286860+00:00

This commit is contained in:
cad-safe-bot 2023-12-08 13:01:02 +00:00
parent ae1c16ec76
commit 91c1831624
2 changed files with 21 additions and 29 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-3164", "id": "CVE-2023-3164",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-02T12:15:09.543", "published": "2023-11-02T12:15:09.543",
"lastModified": "2023-11-09T19:28:46.507", "lastModified": "2023-12-08T12:15:44.307",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information." "value": "A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file."
}, },
{ {
"lang": "es", "lang": "es",
@ -41,20 +41,20 @@
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "LOW", "confidentialityImpact": "NONE",
"integrityImpact": "NONE", "integrityImpact": "NONE",
"availabilityImpact": "LOW", "availabilityImpact": "HIGH",
"baseScore": 4.4, "baseScore": 5.5,
"baseSeverity": "MEDIUM" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 2.5 "impactScore": 3.6
} }
] ]
}, },
@ -75,7 +75,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-125" "value": "CWE-120"
} }
] ]
} }
@ -115,19 +115,16 @@
], ],
"references": [ "references": [
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-4156", "url": "https://access.redhat.com/security/cve/CVE-2023-3164",
"source": "secalert@redhat.com", "source": "secalert@redhat.com"
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213531",
"source": "secalert@redhat.com", "source": "secalert@redhat.com"
"tags": [ },
"Issue Tracking", {
"Patch" "url": "https://gitlab.com/libtiff/libtiff/-/issues/542",
] "source": "secalert@redhat.com"
} }
] ]
} }

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-12-08T07:00:17.604590+00:00 2023-12-08T13:00:58.286860+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-12-08T06:15:45.690000+00:00 2023-12-08T12:15:44.307000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -34,20 +34,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `0`
* [CVE-2023-26158](CVE-2023/CVE-2023-261xx/CVE-2023-26158.json) (`2023-12-08T05:15:07.870`)
* [CVE-2023-48928](CVE-2023/CVE-2023-489xx/CVE-2023-48928.json) (`2023-12-08T05:15:08.807`)
* [CVE-2023-48929](CVE-2023/CVE-2023-489xx/CVE-2023-48929.json) (`2023-12-08T05:15:08.897`)
* [CVE-2023-32460](CVE-2023/CVE-2023-324xx/CVE-2023-32460.json) (`2023-12-08T06:15:45.427`)
* [CVE-2023-45866](CVE-2023/CVE-2023-458xx/CVE-2023-45866.json) (`2023-12-08T06:15:45.690`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `1`
* [CVE-2023-42568](CVE-2023/CVE-2023-425xx/CVE-2023-42568.json) (`2023-12-08T05:15:08.340`) * [CVE-2023-3164](CVE-2023/CVE-2023-31xx/CVE-2023-3164.json) (`2023-12-08T12:15:44.307`)
## Download and Usage ## Download and Usage