fkie_cve-2018-20033
Vulnerability from fkie_nvd
Published
2019-02-25 20:29
Modified
2024-11-21 04:00
Severity ?
Summary
A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/109155 | Broken Link | |
PSIRT-CNA@flexerasoftware.com | https://secuniaresearch.flexerasoftware.com/advisories/85979/ | Not Applicable, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/109155 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://secuniaresearch.flexerasoftware.com/advisories/85979/ | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2021.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
flexera | flexnet_publisher | * | |
oracle | communications_lsms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flexera:flexnet_publisher:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C7C03AE-8A93-4E82-B1EC-CEB6C4402FDF", "versionEndIncluding": "11.16.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*", "matchCriteriaId": "806AF4AF-12FB-4222-84E4-BC9D44EFF09F", "versionEndIncluding": "13.4", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en los componentes de lmgrd y del demonio del fabricante en FlexNet Publisher, en versiones 11.16.1.0 y anteriores, podr\u00eda permitir que un atacante remoto corrompa la memoria asignando/desasignando memoria, cargando lmgrd o el demonio del fabricante y provocando que el latido entre lmgrd y el demonio del fabricante se detenga. Esto forzar\u00eda el cierre del demonio del fabricante. No se han demostrado explotaciones de esta vulnerabilidad." } ], "id": "CVE-2018-20033", "lastModified": "2024-11-21T04:00:48.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-25T20:29:00.233", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/109155" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/85979/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/109155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/85979/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.