mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
181 lines
6.2 KiB
JSON
181 lines
6.2 KiB
JSON
{
|
|
"id": "CVE-2021-24036",
|
|
"sourceIdentifier": "cve-assign@fb.com",
|
|
"published": "2021-07-23T01:15:07.073",
|
|
"lastModified": "2022-10-26T00:30:43.453",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Pasar un tama\u00f1o controlado por un atacante al crear un IOBuf podr\u00eda causar un desbordamiento de enteros, lo que llevar\u00eda a una escritura fuera de l\u00edmites en la pila con la posibilidad de ejecuci\u00f3n de c\u00f3digo remoto. Este problema afecta a las versiones de folly anteriores a la v2021.07.22.00. Este problema afecta a las versiones de HHVM anteriores a la 4.80.5, a todas las versiones entre la 4.81.0 y la 4.102.1, a todas las versiones entre la 4.103.0 y la 4.113.0, y a las versiones 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 y 4.118.1"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-190"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "cve-assign@fb.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-122"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:folly:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2021.07.22.00",
|
|
"matchCriteriaId": "ED848EC8-F695-4D35-B067-D9E726DB8279"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "4.80.5",
|
|
"matchCriteriaId": "DE717551-482F-4C7B-BE36-294F96327735"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "4.81.0",
|
|
"versionEndIncluding": "4.102.1",
|
|
"matchCriteriaId": "A47916E5-F1B3-4C34-8E91-D205F4FAEF69"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "4.103.0",
|
|
"versionEndIncluding": "4.113.0",
|
|
"matchCriteriaId": "DCB9EA9C-DD7A-4CA3-B957-710AA082A3B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:4.114.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90F2D55E-3F60-45D8-98E4-3E61E9E5AD17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:4.115.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BDA3CE0-633D-43A7-8B88-E0A1F046BC47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:4.116.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B613CAC3-7B20-4315-978D-D7F5FC92F873"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:4.117.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A93EB623-9A2B-4554-AC52-BB23E85A0CB2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:4.118.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26CBE42E-25C6-4150-9C0B-1B7CE5BEF03A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:facebook:hhvm:4.118.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73A1E792-0EB5-40F8-A4D6-E6ECAABC8AE5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3",
|
|
"source": "cve-assign@fb.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://hhvm.com/blog/2021/07/20/security-update.html",
|
|
"source": "cve-assign@fb.com",
|
|
"tags": [
|
|
"Product",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.facebook.com/security/advisories/cve-2021-24036",
|
|
"source": "cve-assign@fb.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |