fkie_cve-2023-41706
Vulnerability from fkie_nvd
Published
2024-02-12 09:15
Modified
2024-11-21 08:21
Summary
Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.
Impacted products
Vendor Product Version
open-xchange open-xchange_appsuite *
open-xchange open-xchange_appsuite *
open-xchange open-xchange_appsuite *
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.6.3
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6
open-xchange open-xchange_appsuite 7.10.6



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7804FF21-94F6-4160-9628-B91ED4CDDCB6",
                     versionEndExcluding: "7.6.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3159C504-0462-4AA9-9137-F25961B67ED6",
                     versionEndExcluding: "7.10.6",
                     versionStartExcluding: "7.6.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F37B7CC3-A4D2-4CA5-8159-FE1A9016F9A0",
                     versionEndExcluding: "8.20",
                     versionStartExcluding: "7.10.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "7AB04398-3973-4503-959E-FA8EE511DA45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3464:*:*:*:*:*:*",
                     matchCriteriaId: "161CD641-C9EC-4FBE-BFFD-48C96FE71085",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3519:*:*:*:*:*:*",
                     matchCriteriaId: "73F1F959-F82B-4E00-91AE-C39037A93DDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3569:*:*:*:*:*:*",
                     matchCriteriaId: "E151E1EA-DA35-47CB-80C2-359518C213FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3627:*:*:*:*:*:*",
                     matchCriteriaId: "156910B8-F553-4F4C-B990-131F04001AB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3728:*:*:*:*:*:*",
                     matchCriteriaId: "13248A9A-D131-4596-A511-A18A83F9D4C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3875:*:*:*:*:*:*",
                     matchCriteriaId: "54936294-45A6-410B-B6F6-CC2CEFCE937E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3922:*:*:*:*:*:*",
                     matchCriteriaId: "8EDB7577-5763-41A1-90A7-7D7F225F8C14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3949:*:*:*:*:*:*",
                     matchCriteriaId: "39B4BD56-3236-4AE0-93F6-F0E0190C77AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_3991:*:*:*:*:*:*",
                     matchCriteriaId: "6F20C5D9-6DCA-4F3F-A9A8-FACAE5C4AB18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4047:*:*:*:*:*:*",
                     matchCriteriaId: "F94B78AE-45FE-4BA7-BFD6-55767F8C3A0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4133:*:*:*:*:*:*",
                     matchCriteriaId: "B103D02E-C443-446B-A358-A052866BC624",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4423:*:*:*:*:*:*",
                     matchCriteriaId: "4D578FCB-EE90-4BB9-9E28-DC1FA139787C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4470:*:*:*:*:*:*",
                     matchCriteriaId: "71380C28-6A25-425B-BE7F-6D06E0CE5C2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4552:*:*:*:*:*:*",
                     matchCriteriaId: "DDBF0D2F-2C22-448E-A0D2-E66527188928",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4667:*:*:*:*:*:*",
                     matchCriteriaId: "50EC169C-73B6-40F5-8C7A-6DD71DC19893",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4750:*:*:*:*:*:*",
                     matchCriteriaId: "4B2CA948-280B-4EB8-9309-B016C9557A64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4789:*:*:*:*:*:*",
                     matchCriteriaId: "36511A48-EBD8-40C2-A1FB-10F33264CF3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4839:*:*:*:*:*:*",
                     matchCriteriaId: "EBE8374F-0D7D-422F-83AC-ADF9B9E6E511",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4860:*:*:*:*:*:*",
                     matchCriteriaId: "285B9A4B-6F4F-4899-AD2A-57E22BF9F7BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_4895:*:*:*:*:*:*",
                     matchCriteriaId: "5BAD0604-90FC-4647-854A-E10330579B89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5104:*:*:*:*:*:*",
                     matchCriteriaId: "7F26505E-0F61-40A2-B6BA-17C7E30D375C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5165:*:*:*:*:*:*",
                     matchCriteriaId: "FD3E0ABC-2DAC-4441-96DB-BD84DD8B8E81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5231:*:*:*:*:*:*",
                     matchCriteriaId: "347700F5-3BDA-4DA3-AA81-4D593E131AB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5537:*:*:*:*:*:*",
                     matchCriteriaId: "5EF075DE-44C7-4FC0-9BD7-E7A2C95651D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5637:*:*:*:*:*:*",
                     matchCriteriaId: "5CB6B4D0-E2B8-44F3-877B-293325EF44A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.6.3:patch_release_5910:*:*:*:*:*:*",
                     matchCriteriaId: "716CC742-9F23-4734-9CFF-338A231476D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "A144D75D-60A8-4EE0-813C-F658C626B2AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*",
                     matchCriteriaId: "2DA66230-DE02-4881-A893-E9E78286B157",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*",
                     matchCriteriaId: "955F3DFB-6479-4867-B62A-82730DBEB498",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*",
                     matchCriteriaId: "327D1B56-0D05-4D99-91D4-CC1F0AC32972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*",
                     matchCriteriaId: "D0CD0684-C431-47F8-A2F4-1936D5C5A72B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*",
                     matchCriteriaId: "EAA6A4A7-C1EE-4716-9F4D-2FF4C4D5FEC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*",
                     matchCriteriaId: "D0968764-CCEE-47A7-9111-E106D887DA43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*",
                     matchCriteriaId: "16589FBB-F0CD-4041-8141-5C89FCCA72AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*",
                     matchCriteriaId: "3CB877EE-A5FE-4FF7-9D21-5C1CFA7343D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*",
                     matchCriteriaId: "0DF5FB90-8D6D-4F99-B454-411B1DFFA630",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*",
                     matchCriteriaId: "F58876B9-6C2E-4048-A793-B441A84E86F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*",
                     matchCriteriaId: "D5F177CB-CC45-45A0-9D02-C14A13ECC7A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*",
                     matchCriteriaId: "A89A4192-54E9-4899-8C7B-6C7F7E650D5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*",
                     matchCriteriaId: "F2DC1357-9CD5-415F-A190-2F3F4498EF96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*",
                     matchCriteriaId: "D78ACF64-2802-44DD-AF7A-1BD5EA7F9908",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*",
                     matchCriteriaId: "E8F675FA-1684-413A-B1BE-1C5434AC2862",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*",
                     matchCriteriaId: "F3F1FDC3-35B2-4BDB-A685-75BC72588179",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*",
                     matchCriteriaId: "5B1E509D-2F41-4296-86D2-6BD71783060F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*",
                     matchCriteriaId: "AC93EA37-F341-45EC-B651-4F326FB8C613",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*",
                     matchCriteriaId: "1A4DB8A6-1702-462C-BFCB-39F91D2EFCE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*",
                     matchCriteriaId: "FC0AEFDB-D033-47FC-93FC-8652F922BB8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*",
                     matchCriteriaId: "B5354768-6527-43C2-B492-A8C14AB4E784",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*",
                     matchCriteriaId: "D83F26D1-B8C6-4114-81EC-810DD5412DC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*",
                     matchCriteriaId: "E9EBC010-9963-4636-96F7-A121FCF755A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*",
                     matchCriteriaId: "F626D64B-C301-4CD8-94B4-48689BD3F29C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*",
                     matchCriteriaId: "5E32810C-7B35-42F1-BCA5-E10C02BE2215",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*",
                     matchCriteriaId: "6539D059-8614-4C26-93C4-C2DDCC5D35E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*",
                     matchCriteriaId: "E359EE75-A2F9-479B-B757-CAE1064AB8F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*",
                     matchCriteriaId: "0BCABDEF-D292-406E-B53C-AFF22484E916",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*",
                     matchCriteriaId: "ABE8872C-B1DD-4A45-8EF8-E8C355CA6C54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*",
                     matchCriteriaId: "44B20B83-833A-4C68-8693-365BD046C157",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*",
                     matchCriteriaId: "E254E6D1-D18E-4A2A-A2FF-7D03F39E65DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*",
                     matchCriteriaId: "5F0C5E53-4D15-425A-B4CF-5869353724BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*",
                     matchCriteriaId: "2F4BF5F1-F316-4BAC-83E0-DEAC8C50754E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*",
                     matchCriteriaId: "5CDD03A8-5B86-4B87-9C29-6C967261C5C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*",
                     matchCriteriaId: "6071E15F-4D59-41DC-A4D4-7D1AA392A1F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*",
                     matchCriteriaId: "C72C1CEB-7BF7-4A5F-B2E9-397F86CCBF4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*",
                     matchCriteriaId: "5B0F0218-4224-4084-B38D-9719D3782C03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*",
                     matchCriteriaId: "BFC41329-1AD6-4575-A22D-977EC5539DA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*",
                     matchCriteriaId: "217A06B7-0823-4508-BC0C-AD792BA88F7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*",
                     matchCriteriaId: "246E98B2-A6C8-4410-AA6A-7E81EE8C5E76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*",
                     matchCriteriaId: "74D1EC02-D009-45DA-B1EC-2219E0F0183C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6243:*:*:*:*:*:*",
                     matchCriteriaId: "0F56A261-EC62-423C-B487-35EA9D4A83FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6245:*:*:*:*:*:*",
                     matchCriteriaId: "D295E160-C87A-498D-AB0E-BA1E50825249",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6248:*:*:*:*:*:*",
                     matchCriteriaId: "A30BE138-D745-4F0E-AAE4-202A1C769C85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6249:*:*:*:*:*:*",
                     matchCriteriaId: "7CF4FCB9-7360-4ABB-95FB-0239CDC8D3AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6250:*:*:*:*:*:*",
                     matchCriteriaId: "465DD666-3499-4911-A1DF-6BAAFCCFA006",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6251:*:*:*:*:*:*",
                     matchCriteriaId: "6F18CEDC-5D7A-4496-8B5E-59EBEA4362BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6255:*:*:*:*:*:*",
                     matchCriteriaId: "8C1DE547-F217-4518-AD90-3607AE21F6ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.",
      },
      {
         lang: "es",
         value: "Ahora se supervisa el tiempo de procesamiento de las expresiones de búsqueda de unidades y la solicitud relacionada finaliza si se alcanza un umbral de recursos. La disponibilidad de OX App Suite podría verse reducida debido a la alta carga de procesamiento. Implemente las actualizaciones y lanzamientos de parches proporcionados. El procesamiento de expresiones de búsqueda de unidades definidas por el usuario no está limitado. No se conocen exploits disponibles públicamente.",
      },
   ],
   id: "CVE-2023-41706",
   lastModified: "2024-11-21T08:21:30.800",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "security@open-xchange.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-12T09:15:11.073",
   references: [
      {
         source: "security@open-xchange.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json",
      },
      {
         source: "security@open-xchange.com",
         tags: [
            "Release Notes",
         ],
         url: "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf",
      },
   ],
   sourceIdentifier: "security@open-xchange.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "security@open-xchange.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.