2024-12-08 03:06:42 +00:00

114 lines
3.5 KiB
JSON

{
"id": "CVE-2019-18178",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-04T20:15:10.090",
"lastModified": "2024-11-21T04:32:46.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Real Time Engineers FreeRTOS+FAT 160919a has a use after free. The function FF_Close() is defined in ff_file.c. The file handler pxFile is freed by ffconfigFREE, which (by default) is a macro definition of vPortFree(), but it is reused to flush modified file content from the cache to disk by the function FF_FlushCache()."
},
{
"lang": "es",
"value": "Real Time Engineers FreeRTOS+FAT versi\u00f3n 160919a, presenta un uso de la memoria previamente liberada. La funci\u00f3n FF_Close() es definida en el archivo ff_file.c. El manejador de archivos pxFile es liberado por ffconfigFREE, que (por defecto) es una definici\u00f3n macro de la funci\u00f3n vPortFree(), pero es reusada para vaciar el contenido del archivo modificado desde la memoria cach\u00e9 hacia el disco por la funci\u00f3n FF_FlushCache()."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amazon:freertos\\+fat:160919a:*:*:*:*:*:*:*",
"matchCriteriaId": "5834F9C6-A4FB-454E-9D9D-B3736A2AB6CA"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceforge.net/p/freertos/bugs/199/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sourceforge.net/p/freertos/bugs/199/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}