Skip to content

Commit

Permalink
2 changes (1 new | 1 updated):
Browse files Browse the repository at this point in the history
      - 1 new CVEs:  CVE-2024-13503
      - 1 updated CVEs: CVE-2006-2827
  • Loading branch information
cvelistV5 Github Action committed Jan 17, 2025
1 parent 15acb20 commit e550d6a
Show file tree
Hide file tree
Showing 4 changed files with 255 additions and 85 deletions.
61 changes: 60 additions & 1 deletion cves/2006/2xxx/CVE-2006-2827.json
Original file line number Diff line number Diff line change
Expand Up @@ -171,6 +171,65 @@
"url": "http://www.osvdb.org/25204"
}
]
},
{
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"lang": "en",
"description": "CWE-noinfo Not enough information"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"scope": "UNCHANGED",
"version": "3.1",
"baseScore": 9.8,
"attackVector": "NETWORK",
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"integrityImpact": "HIGH",
"userInteraction": "NONE",
"attackComplexity": "LOW",
"availabilityImpact": "HIGH",
"privilegesRequired": "NONE",
"confidentialityImpact": "HIGH"
}
},
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2025-01-17T13:56:32.615352Z",
"id": "CVE-2006-2827",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-01-17T13:56:38.025Z"
}
}
]
},
Expand All @@ -180,7 +239,7 @@
"cveId": "CVE-2006-2827",
"datePublished": "2006-06-05T17:00:00",
"dateReserved": "2006-06-05T00:00:00",
"dateUpdated": "2024-08-07T18:06:26.640Z",
"dateUpdated": "2025-01-17T13:56:38.025Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
Expand Down
164 changes: 164 additions & 0 deletions cves/2024/13xxx/CVE-2024-13503.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,164 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-13503",
"assignerOrgId": "455daabc-a392-441d-aa46-37d35189897c",
"state": "PUBLISHED",
"assignerShortName": "NCSC.ch",
"dateReserved": "2025-01-17T10:25:42.132Z",
"datePublished": "2025-01-17T13:52:35.803Z",
"dateUpdated": "2025-01-17T13:52:35.803Z"
},
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "affected",
"modules": [
"Updating signaling process in the swdownload binary"
],
"platforms": [
"Linux",
"PowerPC",
"ARM"
],
"product": "NTC2218, NTC2250, NTC2299",
"vendor": "Newtec/iDirect",
"versions": [
{
"lessThanOrEqual": "2.2.6.19",
"status": "affected",
"version": "1.0.1.1",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Johannes Willbold, johannes.willbold@rub.de"
},
{
"lang": "en",
"type": "coordinator",
"value": "Martin Strohmeier, martin.strohmeier@armasuisse.ch"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.<br><p>This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.</p><p>A stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer.<br><br></p>"
}
],
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.\nThis issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.\n\nA stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Exploitable with publicly demonstrated exploit.<br>"
}
],
"value": "Exploitable with publicly demonstrated exploit."
}
],
"impacts": [
{
"capecId": "CAPEC-549",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-549 Local Execution of Code"
}
]
},
{
"capecId": "CAPEC-253",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-253 Remote Code Inclusion"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "455daabc-a392-441d-aa46-37d35189897c",
"shortName": "NCSC.ch",
"dateUpdated": "2025-01-17T13:52:35.803Z"
},
"references": [
{
"url": "https://doi.org/10.1145/3643833.3656139"
},
{
"url": "https://www.youtube.com/watch?v=-pxmly8xeas"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Stack-Based Buffer Overflow in Newtec's update signaling causes RCE",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
}
}
80 changes: 10 additions & 70 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,80 +1,20 @@
{
"fetchTime": "2025-01-17T13:32:19.960Z",
"numberOfChanges": 12,
"fetchTime": "2025-01-17T13:56:55.045Z",
"numberOfChanges": 2,
"new": [
{
"cveId": "CVE-2025-0527",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2025-0527",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2025/0xxx/CVE-2025-0527.json",
"dateUpdated": "2025-01-17T13:31:05.652Z"
"cveId": "CVE-2024-13503",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13503",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13503.json",
"dateUpdated": "2025-01-17T13:52:35.803Z"
}
],
"updated": [
{
"cveId": "CVE-2024-40917",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-40917",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/40xxx/CVE-2024-40917.json",
"dateUpdated": "2025-01-17T13:26:57.833Z"
},
{
"cveId": "CVE-2024-47736",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-47736",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/47xxx/CVE-2024-47736.json",
"dateUpdated": "2025-01-17T13:26:59.000Z"
},
{
"cveId": "CVE-2024-50164",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50164",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50164.json",
"dateUpdated": "2025-01-17T13:27:00.246Z"
},
{
"cveId": "CVE-2024-53128",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53128",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53128.json",
"dateUpdated": "2025-01-17T13:27:01.390Z"
},
{
"cveId": "CVE-2024-53221",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53221",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53221.json",
"dateUpdated": "2025-01-17T13:27:02.547Z"
},
{
"cveId": "CVE-2024-53685",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53685",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53685.json",
"dateUpdated": "2025-01-17T13:27:03.750Z"
},
{
"cveId": "CVE-2024-56664",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56664",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56664.json",
"dateUpdated": "2025-01-17T13:27:04.906Z"
},
{
"cveId": "CVE-2024-57883",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-57883",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/57xxx/CVE-2024-57883.json",
"dateUpdated": "2025-01-17T13:27:06.115Z"
},
{
"cveId": "CVE-2024-57887",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-57887",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/57xxx/CVE-2024-57887.json",
"dateUpdated": "2025-01-17T13:27:07.276Z"
},
{
"cveId": "CVE-2024-57888",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-57888",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/57xxx/CVE-2024-57888.json",
"dateUpdated": "2025-01-17T13:27:08.409Z"
},
{
"cveId": "CVE-2024-57892",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-57892",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/57xxx/CVE-2024-57892.json",
"dateUpdated": "2025-01-17T13:27:09.566Z"
"cveId": "CVE-2006-2827",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2006-2827",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2006/2xxx/CVE-2006-2827.json",
"dateUpdated": "2025-01-17T13:56:38.025Z"
}
],
"error": []
Expand Down
35 changes: 21 additions & 14 deletions cves/deltaLog.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,25 @@
[
{
"fetchTime": "2025-01-17T13:56:55.045Z",
"numberOfChanges": 2,
"new": [
{
"cveId": "CVE-2024-13503",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13503",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13503.json",
"dateUpdated": "2025-01-17T13:52:35.803Z"
}
],
"updated": [
{
"cveId": "CVE-2006-2827",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2006-2827",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2006/2xxx/CVE-2006-2827.json",
"dateUpdated": "2025-01-17T13:56:38.025Z"
}
],
"error": []
},
{
"fetchTime": "2025-01-17T13:32:19.960Z",
"numberOfChanges": 12,
Expand Down Expand Up @@ -128357,19 +128378,5 @@
}
],
"error": []
},
{
"fetchTime": "2024-12-18T13:38:20.219Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-56128",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56128",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56128.json",
"dateUpdated": "2024-12-18T13:38:03.068Z"
}
],
"updated": [],
"error": []
}
]

0 comments on commit e550d6a

Please sign in to comment.