-
Notifications
You must be signed in to change notification settings - Fork 210
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 1 new CVEs: CVE-2024-13503 - 1 updated CVEs: CVE-2006-2827
- Loading branch information
cvelistV5 Github Action
committed
Jan 17, 2025
1 parent
15acb20
commit e550d6a
Showing
4 changed files
with
255 additions
and
85 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,164 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-13503", | ||
"assignerOrgId": "455daabc-a392-441d-aa46-37d35189897c", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "NCSC.ch", | ||
"dateReserved": "2025-01-17T10:25:42.132Z", | ||
"datePublished": "2025-01-17T13:52:35.803Z", | ||
"dateUpdated": "2025-01-17T13:52:35.803Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"affected": [ | ||
{ | ||
"defaultStatus": "affected", | ||
"modules": [ | ||
"Updating signaling process in the swdownload binary" | ||
], | ||
"platforms": [ | ||
"Linux", | ||
"PowerPC", | ||
"ARM" | ||
], | ||
"product": "NTC2218, NTC2250, NTC2299", | ||
"vendor": "Newtec/iDirect", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "2.2.6.19", | ||
"status": "affected", | ||
"version": "1.0.1.1", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"value": "Johannes Willbold, johannes.willbold@rub.de" | ||
}, | ||
{ | ||
"lang": "en", | ||
"type": "coordinator", | ||
"value": "Martin Strohmeier, martin.strohmeier@armasuisse.ch" | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.<br><p>This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.</p><p>A stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer.<br><br></p>" | ||
} | ||
], | ||
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Newtec NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM (Updating signaling process in the swdownload binary modules) allows Local Execution of Code, Remote Code Inclusion.\nThis issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The issue is both present on the PowerPC versions of the modem and the ARM versions.\n\nA stack buffer buffer overflow in the swdownload binary allows attackers to execute arbitrary code. The parse_INFO function uses an unrestricted `sscanf` to read a string of an incoming network packet into a statically sized buffer." | ||
} | ||
], | ||
"exploits": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Exploitable with publicly demonstrated exploit.<br>" | ||
} | ||
], | ||
"value": "Exploitable with publicly demonstrated exploit." | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-549", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-549 Local Execution of Code" | ||
} | ||
] | ||
}, | ||
{ | ||
"capecId": "CAPEC-253", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-253 Remote Code Inclusion" | ||
} | ||
] | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"Automatable": "NOT_DEFINED", | ||
"Recovery": "NOT_DEFINED", | ||
"Safety": "NOT_DEFINED", | ||
"attackComplexity": "LOW", | ||
"attackRequirements": "PRESENT", | ||
"attackVector": "NETWORK", | ||
"baseScore": 9.5, | ||
"baseSeverity": "CRITICAL", | ||
"privilegesRequired": "NONE", | ||
"providerUrgency": "NOT_DEFINED", | ||
"subAvailabilityImpact": "HIGH", | ||
"subConfidentialityImpact": "HIGH", | ||
"subIntegrityImpact": "HIGH", | ||
"userInteraction": "NONE", | ||
"valueDensity": "NOT_DEFINED", | ||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", | ||
"version": "4.0", | ||
"vulnAvailabilityImpact": "HIGH", | ||
"vulnConfidentialityImpact": "HIGH", | ||
"vulnIntegrityImpact": "HIGH", | ||
"vulnerabilityResponseEffort": "NOT_DEFINED" | ||
}, | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
] | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-120", | ||
"description": "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "455daabc-a392-441d-aa46-37d35189897c", | ||
"shortName": "NCSC.ch", | ||
"dateUpdated": "2025-01-17T13:52:35.803Z" | ||
}, | ||
"references": [ | ||
{ | ||
"url": "https://doi.org/10.1145/3643833.3656139" | ||
}, | ||
{ | ||
"url": "https://www.youtube.com/watch?v=-pxmly8xeas" | ||
} | ||
], | ||
"source": { | ||
"discovery": "UNKNOWN" | ||
}, | ||
"title": "Stack-Based Buffer Overflow in Newtec's update signaling causes RCE", | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters