2024-12-08 03:06:42 +00:00

116 lines
3.5 KiB
JSON

{
"id": "CVE-2022-24294",
"sourceIdentifier": "security@apache.org",
"published": "2022-07-24T18:15:09.587",
"lastModified": "2024-11-21T06:50:06.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1."
},
{
"lang": "es",
"value": "Una expresi\u00f3n regular usa en Apache MXNet (incubating) es vulnerable a una potencial denegaci\u00f3n de servicio por consumo excesivo de recursos. El fallo podr\u00eda explotarse cuando es cargado un modelo en Apache MXNet que presenta un nombre de operador especialmente dise\u00f1ado que causar\u00eda que la evaluaci\u00f3n de la expresi\u00f3n regular usara excesivos recursos para intentar una coincidencia. Este problema afecta a Apache MXNet versiones anteriores a 1.9.1"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:mxnet:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.1",
"matchCriteriaId": "CF32D44D-C18B-4E0A-9AA2-5CE197CB8FB7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/07/24/2",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/b1fbfmvzlr2bbp95lqoh3mtovclfcl3o",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2022/07/24/2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/b1fbfmvzlr2bbp95lqoh3mtovclfcl3o",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}