GNU cflow 1.7 parser.c func_body/parse_variable_declaration ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu GNU cflow 1.7 keessatti argameera. Miidhamni argame is hojii func_body/parse_variable_declaration faayilii parser.c keessa. Wanti jijjiirame gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-404 si geessa. Odeeffannoon kun yeroo 05/18/2023 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2023-2789 jedhamee waamama. Weerara kanaaf milkaa'ina argachuuf, networkii naannoo irratti argamuu qabda. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 ଆଡାପ୍ଟେସନ୍ · 72 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
05/18/2023 02:08 PM
ଅଦ୍ୟତନ 1/2
06/10/2023 05:55 PM
ଅଦ୍ୟତନ 2/2
06/10/2023 06:02 PM
software_vendorGNUGNUGNU
software_namecflowcflowcflow
software_version1.71.71.7
software_fileparser.cparser.cparser.c
software_functionfunc_body/parse_variable_declarationfunc_body/parse_variable_declarationfunc_body/parse_variable_declaration
vulnerability_cweCWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-404 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk111
cvss3_vuldb_acLLL
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iNNN
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.mdhttps://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.mdhttps://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.md
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.ziphttps://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.ziphttps://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.zip
source_cveCVE-2023-2789CVE-2023-2789CVE-2023-2789
cna_responsibleVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
advisory_date1684360800 (05/18/2023)1684360800 (05/18/2023)1684360800 (05/18/2023)
cvss2_vuldb_acLLL
cvss2_vuldb_ciNNN
cvss2_vuldb_iiNNN
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_avAAA
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore2.72.72.7
cvss2_vuldb_tempscore2.32.32.3
cvss3_vuldb_basescore3.53.53.5
cvss3_vuldb_tempscore3.23.23.2
cvss3_meta_basescore3.53.54.8
cvss3_meta_tempscore3.23.24.7
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1684360800 (05/18/2023)1684360800 (05/18/2023)
cve_nvd_summaryA vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciN
cvss2_nvd_iiN
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iN
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore2.7
cvss3_nvd_basescore7.5
cvss3_cna_basescore3.5

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!