fkie_cve-2014-8564
Vulnerability from fkie_nvd
Published
2014-11-13 21:32
Modified
2024-11-21 02:19
Severity ?
Summary
The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC43DD1B-D8F0-4CC6-A5A9-C0DCEB1A7131", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8150D656-9B13-49D0-9960-4C78E057AB26", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C048B6A-5AB2-4363-8FE1-88D3F627E1BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABA62CAC-C88C-44E5-A611-366F9AD5FB11", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B53405BD-AC8E-4106-9D21-BCD5815E7ECA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0161F845-C5F4-4318-949A-499A4062FB78", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "DBCACBF9-CE33-4F10-8CFC-84F24CC33476", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "C42F577F-264C-4F8F-955A-67743965AB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9000897D-502D-46E3-95A0-FBCEBB0ED5C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E53BBB9E-3A38-478E-BE88-E5C83E0C9ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C1B8EDFF-5683-4171-BA76-9B26CAE19FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "022F28CD-4D6B-48AB-8E39-244E19D34F67", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "16B5986E-1029-4D40-8012-1FF1615C929A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "45439989-0D3B-4DCE-AB35-B63B1543CD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BBCD4F3C-8BD4-4367-B00C-A1379C158625", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "12F2CFB7-5ACF-4328-B0F8-C3A981CAA368", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "CC3A72EF-FB1C-4CD8-B6C7-B7D60D6A14D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "14624E40-3CAA-45E5-BDF2-F08706FC68BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E743ABC3-6F24-43E1-98E5-6F60BE975212", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "0BDA000C-A616-402B-B964-D5F4ADB6B550", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "62789464-0074-4009-B97B-665A21E0CC25", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "4B02B1BA-4E05-4AFD-B1F8-1CB54F2DC5B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "95A77487-3ABD-40F5-9C98-49A65ED7F16D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "3911F202-5E7B-4DE3-90D9-07278923036B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "4CF1B6CF-3434-4874-9324-87D045511A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "133CA307-1B3A-4DBB-89F8-C780E4B1BA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "48CD2EAB-A10E-4C91-9D00-9F98BD63CA1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "F97BE4C9-E7FC-44FE-9F11-7776BCD6E81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "D97EAF12-679B-4494-871F-0074ABD0E20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "70F58963-0C56-4228-B9DC-1EA54DA8070D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D91451B0-301B-430D-9D77-00F4AE91C10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6917AC57-F49D-4EFC-920C-CCAFDF6174B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E7ACCE21-A19D-4BE5-9BED-30C5A7418719", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "344CCDAD-64EC-419C-995B-51F922AB9E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "49DB8FC4-F84A-47FD-9586-CF02761152A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A1B43AF4-E52B-46EA-81CF-D4DCAE82E7DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D57BDDEB-090D-472C-9FB6-4555429860E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "6CB23D13-94D2-4FAE-AB76-8574E35E02AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D45B0F5E-B4E1-471E-8CDD-85E09837839F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "F430F4C6-A738-4E02-BE76-041F71335E62", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "F272E2DC-7E54-4034-B7BA-30966D57CDFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "64EE97BB-D0EE-444A-96FA-D127892216F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB28F388-DE19-4C25-A838-949CA926C31A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "33DCAA09-7E8C-4C3E-901F-641681AA9E3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "435C588C-A478-4FB8-A47D-2605CB39C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "9EDDABF3-ECA6-433E-A7D6-8E13F0C6433B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0142E0D7-85DD-413B-B176-2FB5E12C2FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "780D6C0C-2B20-425E-B15E-EE1AF9F28B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "DC2D3896-E095-4889-A9D1-6D8EB2882D64", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "C3CCDF3A-BEAB-4DA2-A15A-A855FFFD415A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "425F7D5B-EE8A-46EC-B986-414FB90702C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "9BC83E92-882B-4984-80FC-FAB7F5CD52E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "8AFAAACF-FD4A-4B1C-A35A-E11189DE2F85", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "A62B585C-2FC8-448F-97E7-CAC59548B03A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "07815863-DBCF-41E9-A459-9CE57B74E489", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "F826F2B5-F00A-44FE-9229-B4597017DE9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "A4E4F6F8-80F3-433D-B702-9DEF6D375A64", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "1BE75031-0B8B-44A7-B541-F395BE7AF473", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "827A375E-8045-4A81-AB7C-11A89E862518", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEC1076D-2249-406B-9D43-B24764BBE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F039CD91-0FF6-4640-B981-20A3F9384A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8008DADD-DB6C-4C67-B333-0DC4C7152B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BC9E811B-4EED-4B6A-8836-5405F7F5A53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "567E66B1-53D9-4A80-A938-2FE5C7CEB985", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA2186BE-288F-40FD-B634-76D14578E252", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "773043EA-8C41-4F42-9702-660FD6822FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "37E05061-D666-492E-AF2B-CF30FC2FA759", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A22BC2E4-A2A5-4637-A9B9-9E68FC982BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "68DF059C-4C1D-4B9C-993E-1C4D3510471C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A21B6-4A22-4801-8023-45F39EC02576", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2EA5F76C-3524-4E80-985F-FC74DD20B5E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "FCB890F0-3126-4FDD-8162-AC28754D3D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CAA298-D755-4668-A568-439532DF7A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "13B53422-C666-4140-BF8A-EEDB8AC95A70", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "E6B1861D-61C3-469E-B37F-B76758626BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "07517D8A-C31B-4F4E-87A0-3239F88015DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "1736E9EB-AC26-44D7-99EB-99CC1F596CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "E94E55DE-7CCB-4C91-BBB3-9D11FF5F9440", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "E03D0521-C985-4A2C-A848-43BE614F9113", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "9AFBDD69-430C-4312-8B28-4A51FB4BC8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "BE31FE31-3F85-41F3-9DCB-58A090E63DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*", "matchCriteriaId": "18A0842D-2CAC-4372-80D0-68BCCC28C7BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A91948CE-E418-4450-AB62-9078D3A0FBEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D34267DC-A768-4A0F-BB54-74314B70E4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "160B3AD7-37A3-4A01-B1CD-83E6500E145A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "BCE61F19-A2C3-4FE9-9C5A-D1FB949B6CEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "5EDFE7E2-12FC-4819-8615-F76A312E8BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "4993D25F-607B-4486-B9EC-566A1EEBE73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "9FEF4D26-DD0C-4E67-8901-8B38A51C1FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "49CE4BAE-77EC-469D-9FE2-A807B7E2EC64", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "7921C926-450B-4EFF-B610-B8B8FD17AE1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs." }, { "lang": "es", "value": "La funci\u00f3n _gnutls_ecc_ansi_x963_export en gnutls_ecc.c en GnuTLS 3.x anterior a 3.1.28, 3.2.x anterior a 3.2.20, y 3.3.x anterior a 3.3.10 permite a atacantes remotos causar una denegaci\u00f3n de servicio (escritura fuera de rango) a trav\u00e9s de un certificado malicioso ECC de tipo (1) curva el\u00edptica criptogr\u00e1fica o (2) peticiones de solicitudes de firma de certificado (CSR), relacionado con la generaci\u00f3n de key IDs." } ], "id": "CVE-2014-8564", "lastModified": "2024-11-21T02:19:20.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-13T21:32:13.427", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1846.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/59991" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62284" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62294" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2403-1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1846.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2403-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161443" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.