René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

121 lines
3.4 KiB
JSON

{
"id": "CVE-2018-15503",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-08-18T02:29:01.903",
"lastModified": "2018-11-08T20:49:48.653",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de desempaquetado en la versi\u00f3n 4.0.4 de Swoole carece de controles de tama\u00f1o correctos en el proceso de deserializaci\u00f3n. Un atacante puede crear un objeto serializado para explotar esta vulnerabilidad y provocar un SEGV."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swoole:swoole:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "93EF17F5-CCB3-4CB8-AFE3-706C531F3B1F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/swoole/swoole-src/commit/4cdbce5d9bf2fe596bb6acd7d6611f9e8c253a76",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/swoole/swoole-src/issues/1882",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/",
"source": "cve@mitre.org",
"tags": [
"Technical Description",
"Third Party Advisory"
]
}
]
}