BDU:2016-00513

Vulnerability from fstec - Published: 13.02.2016
VLAI Severity ?
Title
Уязвимость драйвера USB-MIDI ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Description
Уязвимость драйвера USB-MIDI ядра операционной системы Linux связана с использованием памяти после её освобождения. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Vendor
The CentOS Project, Fedora Project, Canonical Ltd., Clement Lefebvre, Сообщество свободного программного обеспечения
Software Name
CentOS, Fedora, Ubuntu, Linux Mint, Linux
Software Version
6 (CentOS), 22 (Fedora), 14.04 (Ubuntu), 17.3 (Linux Mint), от 4.0 до 4.1.18 включительно (Linux), от 4.2 до 4.3.5 включительно (Linux), от 4.4 до 4.4.1 включительно (Linux)
Possible Mitigations
Использование рекомендаций: Для Linux: https://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7 https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.19 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.6 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2
Reference
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://rhn.redhat.com/errata/RHSA-2016-2574.html http://rhn.redhat.com/errata/RHSA-2016-2584.html http://rhn.redhat.com/errata/RHSA-2017-0817.html http://www.debian.org/security/2016/dsa-3503 http://www.openwall.com/lists/oss-security/2016/02/14/2 http://www.securityfocus.com/bid/83256 http://www.securitytracker.com/id/1035072 http://www.ubuntu.com/usn/USN-2928-1 http://www.ubuntu.com/usn/USN-2928-2 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 https://bugzilla.redhat.com/show_bug.cgi?id=1308444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384 https://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7 https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.19 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.6 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2 https://launchpad.net/bugs/1546177 https://ubuntu.com/security/notices/USN-2928-1 https://ubuntu.com/security/notices/USN-2928-2 https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2931-1 https://ubuntu.com/security/notices/USN-2932-1 https://usn.ubuntu.com/usn/usn-2928-1 https://usn.ubuntu.com/usn/usn-2928-2 https://usn.ubuntu.com/usn/usn-2929-1 https://usn.ubuntu.com/usn/usn-2929-2 https://usn.ubuntu.com/usn/usn-2930-1 https://usn.ubuntu.com/usn/usn-2930-2 https://usn.ubuntu.com/usn/usn-2930-3 https://usn.ubuntu.com/usn/usn-2931-1 https://usn.ubuntu.com/usn/usn-2932-1 https://www.cve.org/CVERecord?id=CVE-2016-2384 https://xairy.github.io/blog/2016/cve-2016-2384
CWE
CWE-416

{
  "CVSS 2.0": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
  "CVSS 3.0": "AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "The CentOS Project, Fedora Project, Canonical Ltd., Clement Lefebvre, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (CentOS), 22 (Fedora), 14.04 (Ubuntu), 17.3 (Linux Mint), \u043e\u0442 4.0 \u0434\u043e 4.1.18 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.2 \u0434\u043e 4.3.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.4 \u0434\u043e 4.4.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7\nhttps://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.19\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.6\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.02.2016",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "03.12.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "02.03.2016",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2016-00513",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2016-2384",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "CentOS, Fedora, Ubuntu, Linux Mint, Linux",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 USB-MIDI \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 USB-MIDI \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07d86ca93db7e5cdf4743564d98292042ec21af7\nhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html\nhttp://rhn.redhat.com/errata/RHSA-2016-2574.html\nhttp://rhn.redhat.com/errata/RHSA-2016-2584.html\nhttp://rhn.redhat.com/errata/RHSA-2017-0817.html\nhttp://www.debian.org/security/2016/dsa-3503\nhttp://www.openwall.com/lists/oss-security/2016/02/14/2\nhttp://www.securityfocus.com/bid/83256\nhttp://www.securitytracker.com/id/1035072\nhttp://www.ubuntu.com/usn/USN-2928-1\nhttp://www.ubuntu.com/usn/USN-2928-2\nhttp://www.ubuntu.com/usn/USN-2929-1\nhttp://www.ubuntu.com/usn/USN-2929-2\nhttp://www.ubuntu.com/usn/USN-2930-1\nhttp://www.ubuntu.com/usn/USN-2930-2\nhttp://www.ubuntu.com/usn/USN-2930-3\nhttp://www.ubuntu.com/usn/USN-2931-1\nhttp://www.ubuntu.com/usn/USN-2932-1\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1308444\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384\nhttps://github.com/torvalds/linux/commit/07d86ca93db7e5cdf4743564d98292042ec21af7\nhttps://github.com/xairy/kernel-exploits/tree/master/CVE-2016-2384\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.19\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.6\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2\nhttps://launchpad.net/bugs/1546177\nhttps://ubuntu.com/security/notices/USN-2928-1\nhttps://ubuntu.com/security/notices/USN-2928-2\nhttps://ubuntu.com/security/notices/USN-2929-1\nhttps://ubuntu.com/security/notices/USN-2929-2\nhttps://ubuntu.com/security/notices/USN-2930-1\nhttps://ubuntu.com/security/notices/USN-2930-2\nhttps://ubuntu.com/security/notices/USN-2930-3\nhttps://ubuntu.com/security/notices/USN-2931-1\nhttps://ubuntu.com/security/notices/USN-2932-1\nhttps://usn.ubuntu.com/usn/usn-2928-1\nhttps://usn.ubuntu.com/usn/usn-2928-2\nhttps://usn.ubuntu.com/usn/usn-2929-1\nhttps://usn.ubuntu.com/usn/usn-2929-2\nhttps://usn.ubuntu.com/usn/usn-2930-1\nhttps://usn.ubuntu.com/usn/usn-2930-2\nhttps://usn.ubuntu.com/usn/usn-2930-3\nhttps://usn.ubuntu.com/usn/usn-2931-1\nhttps://usn.ubuntu.com/usn/usn-2932-1\nhttps://www.cve.org/CVERecord?id=CVE-2016-2384\nhttps://xairy.github.io/blog/2016/cve-2016-2384",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u041d\u0435\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 0)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…