2024-12-08 03:06:42 +00:00

120 lines
3.7 KiB
JSON

{
"id": "CVE-2018-11739",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-06-05T11:29:00.417",
"lastModified": "2024-11-21T03:43:56.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in libtskimg.a in The Sleuth Kit (TSK) from release 4.0.2 through to 4.6.1. An out-of-bounds read of a memory region was found in the function raw_read in tsk/img/raw.c which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service attack."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en libtskimg.a en The Sleuth Kit (TSK), desde la versi\u00f3n 4.0.2 hasta la 4.6.1. Se ha encontrado una lectura fuera de l\u00edmites de una regi\u00f3n de memoria en la funci\u00f3n raw_read en tsk/img/raw.c que podr\u00eda ser aprovechada por un atacante para revelar informaci\u00f3n o manipulada para ser le\u00edda desde la memoria no mapeada, lo que provocar\u00eda una denegaci\u00f3n de servicio (DoS)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.2",
"versionEndIncluding": "4.6.1",
"matchCriteriaId": "CE9ACD47-C9E4-498A-9542-7A193E919F9F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sleuthkit/sleuthkit/issues/1267",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/sleuthkit/sleuthkit/issues/1267",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}