2024-12-08 03:06:42 +00:00

145 lines
4.2 KiB
JSON

{
"id": "CVE-2021-28848",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-03T12:15:07.757",
"lastModified": "2024-11-21T06:00:19.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mintty before 3.4.5 allows remote servers to cause a denial of service (Windows GUI hang) by telling the Mintty window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title change."
},
{
"lang": "es",
"value": "Mintty versiones anteriores a 3.4.5, permite a los servidores remotos causar una denegaci\u00f3n de servicio (suspensi\u00f3n de la GUI de Windows) al decirle a la ventana de Mintty que cambie su t\u00edtulo repetidamente a gran velocidad, lo que resulta en muchas llamadas SetWindowTextA o SetWindowTextW. En otras palabras, no implementa un retardo usleep o similar al procesar un cambio de t\u00edtulo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mintty_project:mintty:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.4.5",
"matchCriteriaId": "E80E1781-DAED-47F2-B4F8-295AF018B39B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mintty/mintty/compare/3.4.4...3.4.5",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://mintty.github.io/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mintty/mintty/compare/3.4.4...3.4.5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://mintty.github.io/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}