{ "id": "CVE-2023-49275", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:49.847", "lastModified": "2024-04-19T16:19:49.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1." }, { "lang": "es", "value": "Wazuh es una plataforma gratuita y de c\u00f3digo abierto que se utiliza para la prevenci\u00f3n, detecci\u00f3n y respuesta a amenazas. Se detect\u00f3 una desreferencia de puntero NULL durante la confusi\u00f3n del motor de an\u00e1lisis, lo que permiti\u00f3 a clientes malintencionados realizar DoS en el motor de an\u00e1lisis. El error ocurre cuando `analysisd` recibe un mensaje de syscollector con el `hotfix` `msg_type` pero sin una `timestamp`. Utiliza `cJSON_GetObjectItem()` para obtener el elemento del objeto `timestamp` y lo desreferencia sin verificar un valor `NULL`. Un cliente malintencionado puede hacer DoS en el motor de an\u00e1lisis. Esta vulnerabilidad se solucion\u00f3 en 4.7.1." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-476" } ] } ], "references": [ { "url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", "source": "security-advisories@github.com" }, { "url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", "source": "security-advisories@github.com" }, { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", "source": "security-advisories@github.com" } ] }