2023-11-07 21:03:21 +00:00

149 lines
4.9 KiB
JSON

{
"id": "CVE-2017-7961",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-04-19T15:59:00.210",
"lastModified": "2023-11-07T02:50:18.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an \"outside the range of representable values of type long\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE: third-party analysis reports \"This is not a security issue in my view. The conversion surely is truncating the double into a long value, but there is no impact as the value is one of the RGB components."
},
{
"lang": "es",
"value": "** EN DISPUTA ** La funci\u00f3n cr_tknzr_parse_rgb en cr-tknzr.c en libcroco 0.6.11 y 0.6.12 tiene un problema de comportamiento no definido de \"fuera de rango de valores representables de tipo largo\", que podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente tener otro impacto no especificado a trav\u00e9s de un archivo CSS manipulado. NOTA: seg\u00fan an\u00e1lisis de terceros \"Esto no es un problema de seguridad seg\u00fan mi visi\u00f3n. La conversi\u00f3n seguramente est\u00e1 truncando el valor doble en un valor largo, pero no hay impacto ya que el valor es uno de los componentes RGB\"."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnome:libcroco:0.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9FAE55-99C3-495F-9A6E-E80D231174D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnome:libcroco:0.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "7F691866-18B7-42B3-9AE5-E45CA9E800C8"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html",
"source": "cve@mitre.org"
},
{
"url": "http://openwall.com/lists/oss-security/2017/04/24/2",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1034482",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201707-13",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}