Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-39956 (GCVE-0-2023-39956)
Vulnerability from cvelistv5 – Published: 2023-09-06 20:09 – Updated: 2024-09-26 15:17- CWE-94 - Improper Control of Generation of Code ('Code Injection')
| URL | Tags |
|---|---|
| https://github.com/electron/electron/security/adv… | x_refsource_CONFIRM |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:18:10.164Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39956",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-26T14:44:20.784199Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-26T15:17:59.795Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "electron",
"vendor": "electron",
"versions": [
{
"status": "affected",
"version": "\u003c 22.3.19"
},
{
"status": "affected",
"version": "\u003e= 23.0.0, \u003c 23.3.13"
},
{
"status": "affected",
"version": "\u003e= 24.0.0, \u003c 24.7.1"
},
{
"status": "affected",
"version": "\u003e= 25.0.0, \u003c 25.4.1"
},
{
"status": "affected",
"version": "\u003e= 26.0.0-beta.1, \u003c 26.0.0-beta.13"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-06T20:09:33.185Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
}
],
"source": {
"advisory": "GHSA-7x97-j373-85x5",
"discovery": "UNKNOWN"
},
"title": "Electron: Out-of-package code execution when launched with arbitrary cwd"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-39956",
"datePublished": "2023-09-06T20:09:33.185Z",
"dateReserved": "2023-08-07T16:27:27.075Z",
"dateUpdated": "2024-09-26T15:17:59.795Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-39956",
"date": "2026-05-12",
"epss": "0.00027",
"percentile": "0.07796"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\", \"versionEndExcluding\": \"22.3.9\", \"matchCriteriaId\": \"876893B6-020E-4F0C-ADA8-0AAAFDFB3922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\", \"versionStartIncluding\": \"23.0.0\", \"versionEndExcluding\": \"23.3.13\", \"matchCriteriaId\": \"3C0714E9-9092-49C0-AD01-F56AF468BA49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\", \"versionStartIncluding\": \"24.0.0\", \"versionEndExcluding\": \"24.7.1\", \"matchCriteriaId\": \"95DEED4B-F4E0-486B-B46B-4397519235EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\", \"versionStartIncluding\": \"25.0.0\", \"versionEndExcluding\": \"25.5.0\", \"matchCriteriaId\": \"1BB069BB-C9A7-480C-A689-F83FC630534C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha1:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"39BCC6D5-834D-4883-B7B8-89F7E67BC61E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha2:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"EBEBCE23-C4FC-4EDC-BDC5-2FE8DB113EA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha3:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"84FBB241-6F29-49FD-897B-0A0DFDF884FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha4:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"A88CA9F8-D261-4386-89FF-619F485DF6CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha5:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"6C56F8DA-3DF0-41F0-AA2B-A6038F0F5C67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha6:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"8BA72227-F2E5-47FA-9A0E-15A7A4427633\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha7:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"9EF46C92-82F7-4D80-BEA5-3E397E76EC53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:alpha8:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"82F847A9-299A-4EF8-B132-538B25B3CC7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta1:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"AF7D1848-6965-4C53-8034-1927E36F51A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta10:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"513AF17A-CB29-4C15-831E-EA85A030CF69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta11:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"1A6182B1-2B14-4AD8-AE84-234399E57EF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta12:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"25D4C39D-27FA-4463-8673-7FA542EC984F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta2:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"F204551A-6B2F-4C48-83F7-35B948B63CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta3:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"821BAF73-8B32-4659-B85D-C9E04A5E3FFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta4:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"2A8A2C17-34D3-4726-A8F3-F122496AE57B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta5:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"B4A630C6-9D54-4D96-9D49-D4CAAE9EA5FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta6:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"F71F0038-5C57-498D-9FFB-804975C24C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta7:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"1DA4DBAF-F34B-4788-AD0D-03A03008FB47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta8:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"A6082EF5-BFE1-43EA-BCE9-A7420B50085C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:electronjs:electron:26.0.0:beta9:*:*:*:node.js:*:*\", \"matchCriteriaId\": \"D31FA398-54AE-4162-9A0B-5CC367DBBF63\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.\"}, {\"lang\": \"es\", \"value\": \"\\\"Electron es un framework que le permite escribir aplicaciones de escritorio multiplataforma utilizando JavaScript, HTML y CSS. Las aplicaciones de Electron que se inician como ejecutables de l\\u00ednea de comandos se ven afectadas. Espec\\u00edficamente, este problema solo puede explotarse si se cumplen las siguientes condiciones: \\n1. La aplicaci\\u00f3n se inicia con un directorio de trabajo controlado por el atacante y \\n2. El atacante tiene la capacidad de escribir archivos en ese directorio de trabajo.\\nEsto hace que el riesgo sea bastante bajo, de hecho, normalmente los problemas de este tipo se consideran fuera de nuestro modelo de amenaza, ya que son similares a Chromium y excluimos los ataques f\\u00edsicamente locales, pero dada la capacidad de este problema para eludir ciertas protecciones como la Integridad ASAR, se est\\u00e1 tratando con niveles m\\u00e1s altos de importancia. Este problema se solucion\\u00f3 en las versiones: `26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13` y `22.3.19`. No existen workarounds en la aplicaci\\u00f3n, los usuarios deben actualizar a una versi\\u00f3n parcheada de Electron.\\\"\"}]",
"id": "CVE-2023-39956",
"lastModified": "2024-11-21T08:16:06.807",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 4.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L\", \"baseScore\": 6.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 4.7}]}",
"published": "2023-09-06T21:15:13.217",
"references": "[{\"url\": \"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-39956\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-09-06T21:15:13.217\",\"lastModified\":\"2024-11-21T08:16:06.807\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.\"},{\"lang\":\"es\",\"value\":\"\\\"Electron es un framework que le permite escribir aplicaciones de escritorio multiplataforma utilizando JavaScript, HTML y CSS. Las aplicaciones de Electron que se inician como ejecutables de l\u00ednea de comandos se ven afectadas. Espec\u00edficamente, este problema solo puede explotarse si se cumplen las siguientes condiciones: \\n1. La aplicaci\u00f3n se inicia con un directorio de trabajo controlado por el atacante y \\n2. El atacante tiene la capacidad de escribir archivos en ese directorio de trabajo.\\nEsto hace que el riesgo sea bastante bajo, de hecho, normalmente los problemas de este tipo se consideran fuera de nuestro modelo de amenaza, ya que son similares a Chromium y excluimos los ataques f\u00edsicamente locales, pero dada la capacidad de este problema para eludir ciertas protecciones como la Integridad ASAR, se est\u00e1 tratando con niveles m\u00e1s altos de importancia. Este problema se solucion\u00f3 en las versiones: `26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13` y `22.3.19`. No existen workarounds en la aplicaci\u00f3n, los usuarios deben actualizar a una versi\u00f3n parcheada de Electron.\\\"\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.3,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"22.3.9\",\"matchCriteriaId\":\"876893B6-020E-4F0C-ADA8-0AAAFDFB3922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"23.0.0\",\"versionEndExcluding\":\"23.3.13\",\"matchCriteriaId\":\"3C0714E9-9092-49C0-AD01-F56AF468BA49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"24.0.0\",\"versionEndExcluding\":\"24.7.1\",\"matchCriteriaId\":\"95DEED4B-F4E0-486B-B46B-4397519235EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"25.0.0\",\"versionEndExcluding\":\"25.5.0\",\"matchCriteriaId\":\"1BB069BB-C9A7-480C-A689-F83FC630534C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha1:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"39BCC6D5-834D-4883-B7B8-89F7E67BC61E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha2:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"EBEBCE23-C4FC-4EDC-BDC5-2FE8DB113EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha3:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"84FBB241-6F29-49FD-897B-0A0DFDF884FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha4:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"A88CA9F8-D261-4386-89FF-619F485DF6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha5:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"6C56F8DA-3DF0-41F0-AA2B-A6038F0F5C67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha6:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"8BA72227-F2E5-47FA-9A0E-15A7A4427633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha7:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"9EF46C92-82F7-4D80-BEA5-3E397E76EC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:alpha8:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"82F847A9-299A-4EF8-B132-538B25B3CC7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta1:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"AF7D1848-6965-4C53-8034-1927E36F51A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta10:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"513AF17A-CB29-4C15-831E-EA85A030CF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta11:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"1A6182B1-2B14-4AD8-AE84-234399E57EF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta12:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"25D4C39D-27FA-4463-8673-7FA542EC984F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta2:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"F204551A-6B2F-4C48-83F7-35B948B63CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta3:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"821BAF73-8B32-4659-B85D-C9E04A5E3FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta4:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"2A8A2C17-34D3-4726-A8F3-F122496AE57B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta5:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"B4A630C6-9D54-4D96-9D49-D4CAAE9EA5FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta6:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"F71F0038-5C57-498D-9FFB-804975C24C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta7:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"1DA4DBAF-F34B-4788-AD0D-03A03008FB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta8:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"A6082EF5-BFE1-43EA-BCE9-A7420B50085C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:electronjs:electron:26.0.0:beta9:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"D31FA398-54AE-4162-9A0B-5CC367DBBF63\"}]}]}],\"references\":[{\"url\":\"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\", \"name\": \"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:18:10.164Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-39956\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T14:44:20.784199Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T15:17:54.423Z\"}}], \"cna\": {\"title\": \"Electron: Out-of-package code execution when launched with arbitrary cwd\", \"source\": {\"advisory\": \"GHSA-7x97-j373-85x5\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"electron\", \"product\": \"electron\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 22.3.19\"}, {\"status\": \"affected\", \"version\": \"\u003e= 23.0.0, \u003c 23.3.13\"}, {\"status\": \"affected\", \"version\": \"\u003e= 24.0.0, \u003c 24.7.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 25.0.0, \u003c 25.4.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 26.0.0-beta.1, \u003c 26.0.0-beta.13\"}]}], \"references\": [{\"url\": \"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\", \"name\": \"https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-09-06T20:09:33.185Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-39956\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-26T15:17:59.795Z\", \"dateReserved\": \"2023-08-07T16:27:27.075Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-09-06T20:09:33.185Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2023-08058
Vulnerability from fstec - Published: 06.09.2023{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:P/I:C/A:P",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Electron",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e 22.3.9 (Electron), \u043e\u0442 23.0.0 \u0434\u043e 23.3.13 (Electron), \u043e\u0442 24.0.0 \u0434\u043e 24.7.1 (Electron), \u043e\u0442 25.0.0 \u0434\u043e 25.5.0 (Electron), \u043e\u0442 26.0.0 alpha1 \u0434\u043e 26.0.0 beta9 (Electron)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Electron:\nhttps://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.09.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "22.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "22.11.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-08058",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-39956",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Electron",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 \u0434\u043b\u044f \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Electron, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0438\u043c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 \u043a\u043e\u0434\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u043a\u043e\u0434\u0430 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430) (CWE-94)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 \u0434\u043b\u044f \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Electron \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0438\u043c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 \u043a\u043e\u0434\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/\nhttps://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-94",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,7)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,6)"
}
GSD-2023-39956
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-39956",
"id": "GSD-2023-39956"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-39956"
],
"details": "Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.",
"id": "GSD-2023-39956",
"modified": "2023-12-13T01:20:33.211108Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-39956",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "electron",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003c 22.3.19"
},
{
"version_affected": "=",
"version_value": "\u003e= 23.0.0, \u003c 23.3.13"
},
{
"version_affected": "=",
"version_value": "\u003e= 24.0.0, \u003c 24.7.1"
},
{
"version_affected": "=",
"version_value": "\u003e= 25.0.0, \u003c 25.4.1"
},
{
"version_affected": "=",
"version_value": "\u003e= 26.0.0-beta.1, \u003c 26.0.0-beta.13"
}
]
}
}
]
},
"vendor_name": "electron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-94",
"lang": "eng",
"value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5",
"refsource": "MISC",
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
}
]
},
"source": {
"advisory": "GHSA-7x97-j373-85x5",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "25.5.0",
"versionStartIncluding": "25.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "24.7.1",
"versionStartIncluding": "24.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "23.3.13",
"versionStartIncluding": "23.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"cpe_name": [],
"versionEndExcluding": "22.3.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha1:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha2:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha3:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha4:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha5:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha6:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha7:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:alpha8:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta1:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta10:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta11:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta12:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta2:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta3:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta4:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta5:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta6:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta7:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta8:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:electronjs:electron:26.0.0:beta9:*:*:*:node.js:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-39956"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
},
"lastModifiedDate": "2023-09-12T12:32Z",
"publishedDate": "2023-09-06T21:15Z"
}
}
}
GHSA-7X97-J373-85X5
Vulnerability from github – Published: 2023-09-06 19:51 – Updated: 2023-09-06 19:51Impact
Apps that are launched as command line executables are impacted. E.g. if your app exposes itself in the path as myapp --help
Specifically this issue can only be exploited if the following conditions are met: * Your app is launched with an attacker-controlled working directory * The attacker has the ability to write files to that working directory
This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. Please bear this in mind when reporting similar issues in the future.
Workarounds
There are no app side workarounds, you must update to a patched version of Electron.
Fixed Versions
26.0.0-beta.1325.5.024.7.123.3.1322.3.19
For more information
If you have any questions or comments about this advisory, email us at security@electronjs.org
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "22.3.19"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "23.0.0-alpha.1"
},
{
"fixed": "23.3.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "24.0.0-alpha.1"
},
{
"fixed": "24.7.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "25.0.0-alpha.1"
},
{
"fixed": "25.5.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "electron"
},
"ranges": [
{
"events": [
{
"introduced": "26.0.0-alpha.1"
},
{
"fixed": "26.0.0-beta.13"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-39956"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": true,
"github_reviewed_at": "2023-09-06T19:51:33Z",
"nvd_published_at": "2023-09-06T21:15:13Z",
"severity": "MODERATE"
},
"details": "### Impact\nApps that are launched as command line executables are impacted. E.g. if your app exposes itself in the path as `myapp --help`\n\nSpecifically this issue can only be exploited if the following conditions are met:\n* Your app is launched with an attacker-controlled working directory\n* The attacker has the ability to write files to that working directory\n\nThis makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude [Physically Local Attacks](https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5#:~:text=Physically%20Local%20Attacks) but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. Please bear this in mind when reporting similar issues in the future.\n\n### Workarounds\nThere are no app side workarounds, you must update to a patched version of Electron.\n\n### Fixed Versions\n* `26.0.0-beta.13`\n* `25.5.0`\n* `24.7.1`\n* `23.3.13`\n* `22.3.19`\n\n### For more information\nIf you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org)",
"id": "GHSA-7x97-j373-85x5",
"modified": "2023-09-06T19:51:33Z",
"published": "2023-09-06T19:51:33Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39956"
},
{
"type": "PACKAGE",
"url": "https://github.com/electron/electron"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L",
"type": "CVSS_V3"
}
],
"summary": "Electron vulnerable to out-of-package code execution when launched with arbitrary cwd"
}
CERTFR-2023-AVI-0743
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.7 | ||
| Microsoft | N/A | Microsoft Identity Linux Broker | ||
| Microsoft | N/A | 3D Viewer | ||
| Microsoft | N/A | Dynamics 365 pour Finance and Operations | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Visual Studio Code | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition | ||
| Microsoft | N/A | Microsoft Defender Security Intelligence Updates | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | 3D Builder | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Identity Linux Broker",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Viewer",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Dynamics 365 pour Finance and Operations",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender Security Intelligence Updates",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Builder",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-36800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36800"
},
{
"name": "CVE-2023-36794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36794"
},
{
"name": "CVE-2023-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36777"
},
{
"name": "CVE-2023-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36770"
},
{
"name": "CVE-2023-36739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36739"
},
{
"name": "CVE-2023-36792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36792"
},
{
"name": "CVE-2023-36772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36772"
},
{
"name": "CVE-2023-36758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36758"
},
{
"name": "CVE-2023-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38163"
},
{
"name": "CVE-2023-36745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36745"
},
{
"name": "CVE-2023-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36760"
},
{
"name": "CVE-2023-36759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36759"
},
{
"name": "CVE-2023-36757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36757"
},
{
"name": "CVE-2023-36744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36744"
},
{
"name": "CVE-2023-39956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39956"
},
{
"name": "CVE-2023-36771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36771"
},
{
"name": "CVE-2023-36756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36756"
},
{
"name": "CVE-2023-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38164"
},
{
"name": "CVE-2023-36762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36762"
},
{
"name": "CVE-2023-36742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36742"
},
{
"name": "CVE-2022-41303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41303"
},
{
"name": "CVE-2023-36773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36773"
},
{
"name": "CVE-2023-36764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36764"
},
{
"name": "CVE-2023-36740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36740"
},
{
"name": "CVE-2023-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36886"
},
{
"name": "CVE-2023-36799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36799"
},
{
"name": "CVE-2023-36796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36796"
},
{
"name": "CVE-2023-36736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36736"
},
{
"name": "CVE-2023-36793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36793"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36773 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36773"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36762 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36762"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38163 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36760 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36764 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36770 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36770"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36757 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36757"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36744 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36744"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36771 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36771"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36796 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36777 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36777"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41303 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41303"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36759 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36799 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36739 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36739"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36793 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36758 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36772 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36772"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-39956 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-39956"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36756 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36756"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36736 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36736"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36794 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36886 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36886"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36792 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36742 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36740 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36740"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38164 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36800 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36800"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36745 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36745"
}
],
"reference": "CERTFR-2023-AVI-0743",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation d\u0027identit\u00e9, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0743
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.7 | ||
| Microsoft | N/A | Microsoft Identity Linux Broker | ||
| Microsoft | N/A | 3D Viewer | ||
| Microsoft | N/A | Dynamics 365 pour Finance and Operations | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Visual Studio Code | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition | ||
| Microsoft | N/A | Microsoft Defender Security Intelligence Updates | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | 3D Builder | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Identity Linux Broker",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Viewer",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Dynamics 365 pour Finance and Operations",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender Security Intelligence Updates",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Builder",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-36800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36800"
},
{
"name": "CVE-2023-36794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36794"
},
{
"name": "CVE-2023-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36777"
},
{
"name": "CVE-2023-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36770"
},
{
"name": "CVE-2023-36739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36739"
},
{
"name": "CVE-2023-36792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36792"
},
{
"name": "CVE-2023-36772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36772"
},
{
"name": "CVE-2023-36758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36758"
},
{
"name": "CVE-2023-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38163"
},
{
"name": "CVE-2023-36745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36745"
},
{
"name": "CVE-2023-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36760"
},
{
"name": "CVE-2023-36759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36759"
},
{
"name": "CVE-2023-36757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36757"
},
{
"name": "CVE-2023-36744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36744"
},
{
"name": "CVE-2023-39956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39956"
},
{
"name": "CVE-2023-36771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36771"
},
{
"name": "CVE-2023-36756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36756"
},
{
"name": "CVE-2023-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38164"
},
{
"name": "CVE-2023-36762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36762"
},
{
"name": "CVE-2023-36742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36742"
},
{
"name": "CVE-2022-41303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41303"
},
{
"name": "CVE-2023-36773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36773"
},
{
"name": "CVE-2023-36764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36764"
},
{
"name": "CVE-2023-36740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36740"
},
{
"name": "CVE-2023-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36886"
},
{
"name": "CVE-2023-36799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36799"
},
{
"name": "CVE-2023-36796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36796"
},
{
"name": "CVE-2023-36736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36736"
},
{
"name": "CVE-2023-36793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36793"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36773 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36773"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36762 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36762"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38163 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36760 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36764 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36770 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36770"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36757 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36757"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36744 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36744"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36771 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36771"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36796 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36777 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36777"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41303 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41303"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36759 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36799 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36739 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36739"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36793 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36758 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36772 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36772"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-39956 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-39956"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36756 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36756"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36736 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36736"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36794 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36886 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36886"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36792 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36742 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36740 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36740"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38164 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36800 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36800"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36745 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36745"
}
],
"reference": "CERTFR-2023-AVI-0743",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation d\u0027identit\u00e9, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
WID-SEC-W-2023-2333
Vulnerability from csaf_certbund - Published: 2023-09-12 22:00 - Updated: 2023-11-21 23:00Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft .NET Framework 4.7.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.1
|
— | |
|
Microsoft .NET Framework 4.7.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7.2
|
— | |
|
Microsoft .NET Framework 4.7
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.7
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Microsoft .NET Framework 4.8
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8
|
— | |
|
Microsoft Visual Studio 2017 version 15.9
Microsoft
|
cpe:/a:microsoft:visual_studio_2017:version_15.9
|
— | |
|
Microsoft .NET Framework 3.5.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5.1
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Microsoft .NET Framework 3.5
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.5:-
|
— | |
|
Microsoft Azure DevOps Server 2019.0.1
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.0.1:-
|
— | |
|
Microsoft .NET Framework 4.6.2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.6.2
|
— | |
|
Microsoft Visual Studio Code
Microsoft
|
cpe:/a:microsoft:visual_studio_code:-
|
— | |
|
Microsoft .NET Framework 4.8.1
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:4.8.1
|
— | |
|
Microsoft .NET Framework 2.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:2.0_sp2
|
— | |
|
Microsoft Visual Studio 2022 version 17.7
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.7
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Microsoft Azure DevOps Server 2020.0.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.0.2
|
— | |
|
Microsoft .NET Framework 3.0 SP2
Microsoft / .NET Framework
|
cpe:/a:microsoft:.net_framework:3.0_sp2
|
— | |
|
Microsoft Visual Studio 2019 version 16.11
Microsoft
|
cpe:/a:microsoft:visual_studio_2019:version_16.11
|
— | |
|
Microsoft Visual Studio 2022 version 17.6
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.6
|
— | |
|
Microsoft Azure DevOps Server 2020.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2020.1.2
|
— | |
|
Microsoft Azure DevOps Server 2019.1.2
Microsoft / Azure DevOps Server
|
cpe:/o:microsoft:azure_devops_server:2019.1.2
|
— | |
|
Microsoft Visual Studio 2022 version 17.4
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.4
|
— | |
|
Microsoft Visual Studio 2022 version 17.2
Microsoft / Visual Studio 2022
|
cpe:/a:microsoft:visual_studio_2022:version_17.2
|
— |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| http://linux.oracle.com/errata/ELSA-2023-6245.html | external |
| https://linux.oracle.com/errata/ELSA-2023-6242.html | external |
| https://access.redhat.com/errata/RHSA-2023:6246 | external |
| https://linux.oracle.com/errata/ELSA-2023-6247.html | external |
| https://linux.oracle.com/errata/ELSA-2023-6246.html | external |
| https://www.cybersecurity-help.cz/vdb/SB2023102524 | external |
| https://ubuntu.com/security/notices/USN-6438-2 | external |
| https://linux.oracle.com/errata/ELSA-2023-5143.html | external |
| https://linux.oracle.com/errata/ELSA-2023-5144.html | external |
| https://linux.oracle.com/errata/ELSA-2023-5145.html | external |
| http://linux.oracle.com/errata/ELSA-2023-5146.html | external |
| https://securityonline.info/poc-exploit-published… | external |
| http://linux.oracle.com/errata/ELSA-2023-5145.html | external |
| https://access.redhat.com/errata/RHSA-2023:5146 | external |
| https://access.redhat.com/errata/RHSA-2023:5145 | external |
| https://access.redhat.com/errata/RHSA-2023:5142 | external |
| https://access.redhat.com/errata/RHSA-2023:5143 | external |
| https://access.redhat.com/errata/RHSA-2023:5144 | external |
| https://ubuntu.com/security/notices/USN-6362-1 | external |
| https://msrc.microsoft.com/update-guide | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausf\u00fchrung von Softwareanwendungen und Webdiensten erm\u00f6glicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. f\u00fcr die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.\r\nMicrosoft Azure DevOps Server ist eine Plattform f\u00fcr kollaborative Softwareprojekte.\r\nMicrosoft Visual Studio ist eine integrierte Entwicklungsumgebung f\u00fcr Hochsprachen.\r\nVisual Studio Code ist ein Quelltext-Editor von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in verschiedenen Microsoft Developer Tools ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2333 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2333.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2333 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2333"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6245 vom 2023-11-06",
"url": "http://linux.oracle.com/errata/ELSA-2023-6245.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6242 vom 2023-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2023-6242.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6246 vom 2023-11-02",
"url": "https://access.redhat.com/errata/RHSA-2023:6246"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6247 vom 2023-11-02",
"url": "https://linux.oracle.com/errata/ELSA-2023-6247.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6246 vom 2023-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2023-6246.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6362-2 vom 2023-10-25",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023102524"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6438-2 vom 2023-10-25",
"url": "https://ubuntu.com/security/notices/USN-6438-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5143 vom 2023-09-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-5143.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5144 vom 2023-09-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-5144.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-5145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5146 vom 2023-09-14",
"url": "http://linux.oracle.com/errata/ELSA-2023-5146.html"
},
{
"category": "external",
"summary": "PoC Exploit vom 2023-11-06",
"url": "https://securityonline.info/poc-exploit-published-for-visual-studio-code-rce-vulnerability-cve-2023-36742/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14",
"url": "http://linux.oracle.com/errata/ELSA-2023-5145.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5146 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5146"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5145 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5145"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5142 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5143 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5143"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5144 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5144"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6362-1 vom 2023-09-12",
"url": "https://ubuntu.com/security/notices/USN-6362-1"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-09-12",
"url": "https://msrc.microsoft.com/update-guide"
}
],
"source_lang": "en-US",
"title": "Microsoft Developer Tools: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-11-21T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:58:21.710+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2333",
"initial_release_date": "2023-09-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-10-24T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-11-02T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2023-11-06T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-11-21T23:00:00.000+00:00",
"number": "7",
"summary": "PoC aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.8.1",
"product": {
"name": "Microsoft .NET Framework 4.8.1",
"product_id": "1273212",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.8.1"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 3.5.1",
"product": {
"name": "Microsoft .NET Framework 3.5.1",
"product_id": "130815",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:3.5.1"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.6.2",
"product": {
"name": "Microsoft .NET Framework 4.6.2",
"product_id": "336763",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.6.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.7",
"product": {
"name": "Microsoft .NET Framework 4.7",
"product_id": "432554",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.7"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.7.1",
"product": {
"name": "Microsoft .NET Framework 4.7.1",
"product_id": "432555",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.7.1"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.7.2",
"product": {
"name": "Microsoft .NET Framework 4.7.2",
"product_id": "432556",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.7.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.8",
"product": {
"name": "Microsoft .NET Framework 4.8",
"product_id": "432557",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.8"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 3.5",
"product": {
"name": "Microsoft .NET Framework 3.5",
"product_id": "834793",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:3.5:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 2.0 SP2",
"product": {
"name": "Microsoft .NET Framework 2.0 SP2",
"product_id": "T021515",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:2.0_sp2"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 3.0 SP2",
"product": {
"name": "Microsoft .NET Framework 3.0 SP2",
"product_id": "T024564",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:3.0_sp2"
}
}
}
],
"category": "product_name",
"name": ".NET Framework"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2019.0.1",
"product": {
"name": "Microsoft Azure DevOps Server 2019.0.1",
"product_id": "766289",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2019.0.1:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2019.1.2",
"product": {
"name": "Microsoft Azure DevOps Server 2019.1.2",
"product_id": "T029128",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2019.1.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2020.1.2",
"product": {
"name": "Microsoft Azure DevOps Server 2020.1.2",
"product_id": "T029129",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2020.1.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2020.0.2",
"product": {
"name": "Microsoft Azure DevOps Server 2020.0.2",
"product_id": "T029804",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2020.0.2"
}
}
}
],
"category": "product_name",
"name": "Azure DevOps Server"
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2017 version 15.9",
"product": {
"name": "Microsoft Visual Studio 2017 version 15.9",
"product_id": "T015502",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2017:version_15.9"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2019 version 16.11",
"product": {
"name": "Microsoft Visual Studio 2019 version 16.11",
"product_id": "T024563",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2019:version_16.11"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.2",
"product_id": "T028102",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.4",
"product_id": "T028103",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.4"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.6",
"product_id": "T028105",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.6"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.7",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.7",
"product_id": "T029805",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.7"
}
}
}
],
"category": "product_name",
"name": "Visual Studio 2022"
},
{
"category": "product_name",
"name": "Microsoft Visual Studio Code",
"product": {
"name": "Microsoft Visual Studio Code",
"product_id": "699261",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_code:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39956",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-39956"
},
{
"cve": "CVE-2023-38155",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-38155"
},
{
"cve": "CVE-2023-36799",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36799"
},
{
"cve": "CVE-2023-36796",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36796"
},
{
"cve": "CVE-2023-36794",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36794"
},
{
"cve": "CVE-2023-36793",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36793"
},
{
"cve": "CVE-2023-36792",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36792"
},
{
"cve": "CVE-2023-36788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36788"
},
{
"cve": "CVE-2023-36759",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36759"
},
{
"cve": "CVE-2023-36758",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36758"
},
{
"cve": "CVE-2023-36742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36742"
},
{
"cve": "CVE-2023-33136",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-33136"
}
]
}
FKIE_CVE-2023-39956
Vulnerability from fkie_nvd - Published: 2023-09-06 21:15 - Updated: 2024-11-21 08:166.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
| Vendor | Product | Version | |
|---|---|---|---|
| electronjs | electron | * | |
| electronjs | electron | * | |
| electronjs | electron | * | |
| electronjs | electron | * | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 | |
| electronjs | electron | 26.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "876893B6-020E-4F0C-ADA8-0AAAFDFB3922",
"versionEndExcluding": "22.3.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3C0714E9-9092-49C0-AD01-F56AF468BA49",
"versionEndExcluding": "23.3.13",
"versionStartIncluding": "23.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "95DEED4B-F4E0-486B-B46B-4397519235EC",
"versionEndExcluding": "24.7.1",
"versionStartIncluding": "24.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "1BB069BB-C9A7-480C-A689-F83FC630534C",
"versionEndExcluding": "25.5.0",
"versionStartIncluding": "25.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha1:*:*:*:node.js:*:*",
"matchCriteriaId": "39BCC6D5-834D-4883-B7B8-89F7E67BC61E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha2:*:*:*:node.js:*:*",
"matchCriteriaId": "EBEBCE23-C4FC-4EDC-BDC5-2FE8DB113EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha3:*:*:*:node.js:*:*",
"matchCriteriaId": "84FBB241-6F29-49FD-897B-0A0DFDF884FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha4:*:*:*:node.js:*:*",
"matchCriteriaId": "A88CA9F8-D261-4386-89FF-619F485DF6CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha5:*:*:*:node.js:*:*",
"matchCriteriaId": "6C56F8DA-3DF0-41F0-AA2B-A6038F0F5C67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha6:*:*:*:node.js:*:*",
"matchCriteriaId": "8BA72227-F2E5-47FA-9A0E-15A7A4427633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha7:*:*:*:node.js:*:*",
"matchCriteriaId": "9EF46C92-82F7-4D80-BEA5-3E397E76EC53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:alpha8:*:*:*:node.js:*:*",
"matchCriteriaId": "82F847A9-299A-4EF8-B132-538B25B3CC7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta1:*:*:*:node.js:*:*",
"matchCriteriaId": "AF7D1848-6965-4C53-8034-1927E36F51A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta10:*:*:*:node.js:*:*",
"matchCriteriaId": "513AF17A-CB29-4C15-831E-EA85A030CF69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta11:*:*:*:node.js:*:*",
"matchCriteriaId": "1A6182B1-2B14-4AD8-AE84-234399E57EF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta12:*:*:*:node.js:*:*",
"matchCriteriaId": "25D4C39D-27FA-4463-8673-7FA542EC984F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta2:*:*:*:node.js:*:*",
"matchCriteriaId": "F204551A-6B2F-4C48-83F7-35B948B63CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta3:*:*:*:node.js:*:*",
"matchCriteriaId": "821BAF73-8B32-4659-B85D-C9E04A5E3FFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta4:*:*:*:node.js:*:*",
"matchCriteriaId": "2A8A2C17-34D3-4726-A8F3-F122496AE57B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta5:*:*:*:node.js:*:*",
"matchCriteriaId": "B4A630C6-9D54-4D96-9D49-D4CAAE9EA5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta6:*:*:*:node.js:*:*",
"matchCriteriaId": "F71F0038-5C57-498D-9FFB-804975C24C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta7:*:*:*:node.js:*:*",
"matchCriteriaId": "1DA4DBAF-F34B-4788-AD0D-03A03008FB47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta8:*:*:*:node.js:*:*",
"matchCriteriaId": "A6082EF5-BFE1-43EA-BCE9-A7420B50085C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:electronjs:electron:26.0.0:beta9:*:*:*:node.js:*:*",
"matchCriteriaId": "D31FA398-54AE-4162-9A0B-5CC367DBBF63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron."
},
{
"lang": "es",
"value": "\"Electron es un framework que le permite escribir aplicaciones de escritorio multiplataforma utilizando JavaScript, HTML y CSS. Las aplicaciones de Electron que se inician como ejecutables de l\u00ednea de comandos se ven afectadas. Espec\u00edficamente, este problema solo puede explotarse si se cumplen las siguientes condiciones: \n1. La aplicaci\u00f3n se inicia con un directorio de trabajo controlado por el atacante y \n2. El atacante tiene la capacidad de escribir archivos en ese directorio de trabajo.\nEsto hace que el riesgo sea bastante bajo, de hecho, normalmente los problemas de este tipo se consideran fuera de nuestro modelo de amenaza, ya que son similares a Chromium y excluimos los ataques f\u00edsicamente locales, pero dada la capacidad de este problema para eludir ciertas protecciones como la Integridad ASAR, se est\u00e1 tratando con niveles m\u00e1s altos de importancia. Este problema se solucion\u00f3 en las versiones: `26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13` y `22.3.19`. No existen workarounds en la aplicaci\u00f3n, los usuarios deben actualizar a una versi\u00f3n parcheada de Electron.\""
}
],
"id": "CVE-2023-39956",
"lastModified": "2024-11-21T08:16:06.807",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.3,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-06T21:15:13.217",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/electron/electron/security/advisories/GHSA-7x97-j373-85x5"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.