2025-03-02 03:03:52 +00:00

60 lines
2.0 KiB
JSON

{
"id": "CVE-2024-11347",
"sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853",
"published": "2025-02-13T19:15:13.537",
"lastModified": "2025-02-13T19:15:13.537",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer Overflow or Wraparound vulnerability in Lexmark International CX, XC, CS, et. Al. (Postscript interpreter modules) allows Forced Integer Overflow.The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user."
},
{
"lang": "es",
"value": "La vulnerabilidad de desbordamiento de enteros o envolvente en Lexmark International CX, XC, CS, et. Al. (m\u00f3dulos de interpretaci\u00f3n Postscript) permite un desbordamiento de enteros forzado. Un atacante puede aprovechar la vulnerabilidad para ejecutar c\u00f3digo arbitrario como un usuario sin privilegios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "7bc73191-a2b6-4c63-9918-753964601853",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "7bc73191-a2b6-4c63-9918-753964601853",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
"source": "7bc73191-a2b6-4c63-9918-753964601853"
}
]
}