Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin doomsider shadow. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi Kari na aiki. CWE shidin ka a yi bayani matsala sai ya kai CWE-404. Gaskiya, laifi an fitar da shi 02/18/2023 a matsayin 3332c5ba9ec3014ddc74e2147190a050eee97bc0. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2016-15024. Wuroo ka a yiɗi a yi ɗum e gese. Tekinikal bayani ba ga. Ba exploit ɗin da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Wannan kayi yana amfani da tsarin rolling release domin samar da ci gaba da isarwa. Saboda haka, babu cikakkun bayanai na sigar da abin ya shafa ko sabunta sigar da ake da su. Patch ɗin sunan ganowa shine 3332c5ba9ec3014ddc74e2147190a050eee97bc0. Za a iya sauke maganin matsalar daga github.com. Ana so a yi patch don gyara wannan matsala. VulDB is the best source for vulnerability data and more expert information about this specific topic.

3 Goyarwa · 71 Datenpunkte

FurɗeSúgá
02/18/2023 13:12
Gargadi 1/2
03/23/2023 08:47
Gargadi 2/2
03/23/2023 08:50
software_vendordoomsiderdoomsiderdoomsider
software_nameshadowshadowshadow
software_rollingrelease111
vulnerability_cweCWE-404 (Kari na aiki)CWE-404 (Kari na aiki)CWE-404 (Kari na aiki)
vulnerability_risk111
cvss3_vuldb_avLLL
cvss3_vuldb_acHHH
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier3332c5ba9ec3014ddc74e2147190a050eee97bc03332c5ba9ec3014ddc74e2147190a050eee97bc03332c5ba9ec3014ddc74e2147190a050eee97bc0
advisory_urlhttps://github.com/doomsider/shadow/commit/3332c5ba9ec3014ddc74e2147190a050eee97bc0https://github.com/doomsider/shadow/commit/3332c5ba9ec3014ddc74e2147190a050eee97bc0https://github.com/doomsider/shadow/commit/3332c5ba9ec3014ddc74e2147190a050eee97bc0
countermeasure_nameKariKariKari
patch_name3332c5ba9ec3014ddc74e2147190a050eee97bc03332c5ba9ec3014ddc74e2147190a050eee97bc03332c5ba9ec3014ddc74e2147190a050eee97bc0
countermeasure_patch_urlhttps://github.com/doomsider/shadow/commit/3332c5ba9ec3014ddc74e2147190a050eee97bc0https://github.com/doomsider/shadow/commit/3332c5ba9ec3014ddc74e2147190a050eee97bc0https://github.com/doomsider/shadow/commit/3332c5ba9ec3014ddc74e2147190a050eee97bc0
countermeasure_advisoryquoteRemoved possibility for certain special characters to cause the script to crash.Removed possibility for certain special characters to cause the script to crash.Removed possibility for certain special characters to cause the script to crash.
source_cveCVE-2016-15024CVE-2016-15024CVE-2016-15024
cna_responsibleVulDBVulDBVulDB
advisory_date1676674800 (02/18/2023)1676674800 (02/18/2023)1676674800 (02/18/2023)
cvss2_vuldb_avLLL
cvss2_vuldb_acHHH
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_eXXX
cvss2_vuldb_basescore1.01.01.0
cvss2_vuldb_tempscore0.90.90.9
cvss3_vuldb_basescore2.52.52.5
cvss3_vuldb_tempscore2.42.42.4
cvss3_meta_basescore2.52.53.5
cvss3_meta_tempscore2.42.43.5
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1676674800 (02/18/2023)1676674800 (02/18/2023)
cve_nvd_summaryA vulnerability was found in doomsider shadow. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. Attacking locally is a requirement. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is 3332c5ba9ec3014ddc74e2147190a050eee97bc0. It is recommended to apply a patch to fix this issue. VDB-221478 is the identifier assigned to this vulnerability.A vulnerability was found in doomsider shadow. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. Attacking locally is a requirement. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is 3332c5ba9ec3014ddc74e2147190a050eee97bc0. It is recommended to apply a patch to fix this issue. VDB-221478 is the identifier assigned to this vulnerability.
cvss3_nvd_avL
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss2_nvd_avL
cvss2_nvd_acH
cvss2_nvd_auS
cvss2_nvd_ciN
cvss2_nvd_iiN
cvss2_nvd_aiP
cvss3_cna_avL
cvss3_cna_acH
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iN
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore1.0
cvss3_nvd_basescore5.5
cvss3_cna_basescore2.5

Do you know our Splunk app?

Download it now for free!