Secure Systems Engineering Connaisseur जोपर्यंत 3.3.0 Delegation Name targets_schema.json सेवा नाकारली

एक दुर्बलता जी समस्याग्रस्त म्हणून ओळखली गेली आहे, ती Secure Systems Engineering Connaisseur जोपर्यंत 3.3.0 मध्ये सापडली आहे. संबंधित आहे अज्ञात फंक्शन फाइल connaisseur/res/targets_schema.json च्या घटक Delegation Name Handler च्या. सॉफ्टवेअरमध्ये केलेले बदल सेवा नाकारली यास कारणीभूत ठरतात. CWE द्वारे समस्या जाहीर केल्यास CWE-1333 येथे पोहोचता येते. ही दुर्बलता प्रकाशित झाली होती 28/11/2023 म्हणून 1407. github.com या ठिकाणी सल्ला डाउनलोडसाठी उपलब्ध आहे. ही दुर्बलता CVE-2023-7279 म्हणून ओळखली जाते. हल्ला स्थानिक नेटवर्कमध्येच केला जावा लागतो. तांत्रिक माहिती उपलब्ध आहे. यासाठी कोणताही एक्स्प्लॉइट उपलब्ध नाही. आत्ताच्या क्षणी सुमारे USD $0-$5k असण्याची शक्यता आहे. MITRE ATT&CK प्रकल्प T1449.003 या हल्ला तंत्रज्ञानाची घोषणा करतो. याला परिभाषित केलेले नाही असे घोषित करण्यात आले आहे. 0-डे म्हणून त्याची अंदाजित काळ्या बाजारातील किंमत $0-$5k एवढी होती. आवृत्ती 3.3.1 वर अद्ययावत केल्याने ही समस्या सोडवता येऊ शकते. नवीन आवृत्ती डाउनलोडसाठी github.com येथे तयार आहे. पॅचचे नाव 524b73ff7306707f6d3a4d1e86401479bca91b02 आहे. बगफिक्स डाउनलोडसाठी github.com येथे उपलब्ध आहे. प्रभावित घटकाचा अपग्रेड करण्याची शिफारस केली जाते. Once again VulDB remains the best source for vulnerability data.

4 बदल · 89 डेटा पॉइंट्स

शेततयार केली
31/08/2024 12:28 PM
अद्ययावत 1/3
02/09/2024 08:24 PM
अद्ययावत 2/3
03/09/2024 11:08 AM
अद्ययावत 3/3
06/09/2024 06:10 AM
software_vendorSecure Systems EngineeringSecure Systems EngineeringSecure Systems EngineeringSecure Systems Engineering
software_nameConnaisseurConnaisseurConnaisseurConnaisseur
software_version<=3.3.0<=3.3.0<=3.3.0<=3.3.0
software_componentDelegation Name HandlerDelegation Name HandlerDelegation Name HandlerDelegation Name Handler
software_fileconnaisseur/res/targets_schema.jsonconnaisseur/res/targets_schema.jsonconnaisseur/res/targets_schema.jsonconnaisseur/res/targets_schema.json
vulnerability_cweCWE-1333 (सेवा नाकारली)CWE-1333 (सेवा नाकारली)CWE-1333 (सेवा नाकारली)CWE-1333 (सेवा नाकारली)
vulnerability_risk1111
cvss3_vuldb_acHHHH
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iNNNN
cvss3_vuldb_aLLLL
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCC
advisory_date1701126000 (28/11/2023)1701126000 (28/11/2023)1701126000 (28/11/2023)1701126000 (28/11/2023)
advisory_identifier1407140714071407
advisory_urlhttps://github.com/sse-secure-systems/connaisseur/pull/1407https://github.com/sse-secure-systems/connaisseur/pull/1407https://github.com/sse-secure-systems/connaisseur/pull/1407https://github.com/sse-secure-systems/connaisseur/pull/1407
countermeasure_nameअपग्रेड कराअपग्रेड कराअपग्रेड कराअपग्रेड करा
countermeasure_date1701126000 (28/11/2023)1701126000 (28/11/2023)1701126000 (28/11/2023)1701126000 (28/11/2023)
upgrade_version3.3.13.3.13.3.13.3.1
countermeasure_upgrade_urlhttps://github.com/sse-secure-systems/connaisseur/releases/tag/v3.3.1https://github.com/sse-secure-systems/connaisseur/releases/tag/v3.3.1https://github.com/sse-secure-systems/connaisseur/releases/tag/v3.3.1https://github.com/sse-secure-systems/connaisseur/releases/tag/v3.3.1
patch_name524b73ff7306707f6d3a4d1e86401479bca91b02524b73ff7306707f6d3a4d1e86401479bca91b02524b73ff7306707f6d3a4d1e86401479bca91b02524b73ff7306707f6d3a4d1e86401479bca91b02
countermeasure_patch_urlhttps://github.com/sse-secure-systems/connaisseur/commit/524b73ff7306707f6d3a4d1e86401479bca91b02https://github.com/sse-secure-systems/connaisseur/commit/524b73ff7306707f6d3a4d1e86401479bca91b02https://github.com/sse-secure-systems/connaisseur/commit/524b73ff7306707f6d3a4d1e86401479bca91b02https://github.com/sse-secure-systems/connaisseur/commit/524b73ff7306707f6d3a4d1e86401479bca91b02
countermeasure_advisoryquoteThis commit fixes a regular expression denial of service vulnerability that was present during the schema validation of the targets.json TUF file in a Notary validation. An adversary with the ability to altThis commit fixes a regular expression denial of service vulnerability that was present during the schema validation of the targets.json TUF file in a Notary validation. An adversary with the ability to altThis commit fixes a regular expression denial of service vulnerability that was present during the schema validation of the targets.json TUF file in a Notary validation. An adversary with the ability to altThis commit fixes a regular expression denial of service vulnerability that was present during the schema validation of the targets.json TUF file in a Notary validation. An adversary with the ability to alt
source_cveCVE-2023-7279CVE-2023-7279CVE-2023-7279CVE-2023-7279
cna_responsibleVulDBVulDBVulDBVulDB
cvss2_vuldb_acHHHH
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiPPPP
cvss2_vuldb_rcCCCC
cvss2_vuldb_rlOFOFOFOF
cvss4_vuldb_acHHHH
cvss4_vuldb_vcNNNN
cvss4_vuldb_viNNNN
cvss4_vuldb_vaLLLL
cvss2_vuldb_avAAAA
cvss2_vuldb_auSSSS
cvss2_vuldb_eNDNDNDND
cvss3_vuldb_avAAAA
cvss3_vuldb_prLLLL
cvss3_vuldb_uiNNNN
cvss3_vuldb_eXXXX
cvss4_vuldb_avAAAA
cvss4_vuldb_atNNNN
cvss4_vuldb_prLLLL
cvss4_vuldb_uiNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss4_vuldb_eXXXX
cvss2_vuldb_basescore1.41.41.41.4
cvss2_vuldb_tempscore1.21.21.21.2
cvss3_vuldb_basescore2.62.62.62.6
cvss3_vuldb_tempscore2.52.52.52.5
cvss3_meta_basescore2.62.62.63.7
cvss3_meta_tempscore2.52.52.53.7
cvss4_vuldb_bscore2.12.12.12.1
cvss4_vuldb_btscore2.12.12.12.1
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability has been found in Secure Systems Engineering Connaisseur up to 3.3.0 and classified as problematic. This vulnerability affects unknown code of the file connaisseur/res/targets_schema.json of the component Delegation Name Handler. The manipulation leads to inefficient regular expression complexity. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 524b73ff7306707f6d3a4d1e86401479bca91b02. It is recommended to upgrade the affected component.A vulnerability has been found in Secure Systems Engineering Connaisseur up to 3.3.0 and classified as problematic. This vulnerability affects unknown code of the file connaisseur/res/targets_schema.json of the component Delegation Name Handler. The manipulation leads to inefficient regular expression complexity. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 524b73ff7306707f6d3a4d1e86401479bca91b02. It is recommended to upgrade the affected component.A vulnerability has been found in Secure Systems Engineering Connaisseur up to 3.3.0 and classified as problematic. This vulnerability affects unknown code of the file connaisseur/res/targets_schema.json of the component Delegation Name Handler. The manipulation leads to inefficient regular expression complexity. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 524b73ff7306707f6d3a4d1e86401479bca91b02. It is recommended to upgrade the affected component.
cvss3_cna_avAAA
cvss3_cna_acHHH
cvss3_cna_prLLL
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iNNN
cvss3_cna_aLLL
cvss3_cna_basescore2.62.62.6
cvss2_cna_avAAA
cvss2_cna_acHHH
cvss2_cna_auSSS
cvss2_cna_ciNNN
cvss2_cna_iiNNN
cvss2_cna_aiPPP
cvss2_cna_basescore1.41.41.4
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en Secure Systems Engineering Connaisseur hasta la versión 3.3.0 y se ha clasificado como problemática. Esta vulnerabilidad afecta al código desconocido del archivo connaisseur/res/targets_schema.json del componente Delegation Name Handler. La manipulación conduce a una complejidad ineficiente de las expresiones regulares. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. La actualización a la versión 3.3.1 puede solucionar este problema. El nombre del parche es 524b73ff7306707f6d3a4d1e86401479bca91b02. Se recomienda actualizar el componente afectado.Se ha encontrado una vulnerabilidad en Secure Systems Engineering Connaisseur hasta la versión 3.3.0 y se ha clasificado como problemática. Esta vulnerabilidad afecta al código desconocido del archivo connaisseur/res/targets_schema.json del componente Delegation Name Handler. La manipulación conduce a una complejidad ineficiente de las expresiones regulares. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. La actualización a la versión 3.3.1 puede solucionar este problema. El nombre del parche es 524b73ff7306707f6d3a4d1e86401479bca91b02. Se recomienda actualizar el componente afectado.
cvss3_nvd_avN
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss3_nvd_basescore5.9

Do you know our Splunk app?

Download it now for free!