From d827dd68b05882e5de2f2a737ad7ab6b6a2e0ff7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 27 Jan 2024 15:00:27 +0000 Subject: [PATCH] Auto-Update: 2024-01-27T15:00:23.914406+00:00 --- CVE-2024/CVE-2024-09xx/CVE-2024-0962.json | 96 +++++++++++++++++++++++ README.md | 11 ++- 2 files changed, 101 insertions(+), 6 deletions(-) create mode 100644 CVE-2024/CVE-2024-09xx/CVE-2024-0962.json diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json new file mode 100644 index 00000000000..e80af4c6888 --- /dev/null +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-0962", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-27T13:15:07.973", + "lastModified": "2024-01-27T13:15:07.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-252206 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/obgm/libcoap/issues/1310", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/obgm/libcoap/pull/1311", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.252206", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.252206", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6c4e303c31a..fc5b9567c86 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-27T13:00:24.346666+00:00 +2024-01-27T15:00:23.914406+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-27T12:15:07.903000+00:00 +2024-01-27T13:15:07.973000+00:00 ``` ### Last Data Feed Release @@ -29,15 +29,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -236969 +236970 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -* [CVE-2024-0959](CVE-2024/CVE-2024-09xx/CVE-2024-0959.json) (`2024-01-27T11:15:17.497`) -* [CVE-2024-0960](CVE-2024/CVE-2024-09xx/CVE-2024-0960.json) (`2024-01-27T12:15:07.903`) +* [CVE-2024-0962](CVE-2024/CVE-2024-09xx/CVE-2024-0962.json) (`2024-01-27T13:15:07.973`) ### CVEs modified in the last Commit