René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
3.3 KiB
JSON

{
"id": "CVE-2018-7039",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-14T19:29:00.307",
"lastModified": "2018-03-15T17:16:32.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "CCN-lite 2.0.0 Beta allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because the ccnl_ndntlv_prependBlob function in ccnl-pkt-ndntlv.c can be called with wrong arguments. Specifically, there is an incorrect integer data type causing a negative third argument in some cases of crafted TLV data with inconsistent length information."
},
{
"lang": "es",
"value": "CCN-lite 2.0.0 Beta permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer) u otro tipo de impacto sin especificar debido a que la funci\u00f3n ccnl_ndntlv_prependBlob en ccnl-pkt-ndntlv.c se puede llamar con argumentos incorrectos. Espec\u00edficamente, existe un tipo de datos de enteros incorrecto que resulta en un tercer argumento incorrecto, en algunos casos de datos TLV manipulados, con informaci\u00f3n de longitud inconsistente."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ccn-lite:ccn-lite:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83C4FA31-E39A-4AE2-8F60-BBC51D874467"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cn-uofbasel/ccn-lite/issues/191",
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
}
]
}