CWE-404
Improper Resource Shutdown or Release
The product does not release or incorrectly releases a resource before it is made available for re-use.
CVE-2017-20186 (GCVE-0-2017-20186)
Vulnerability from cvelistv5
3.5 (Low) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
- CWE-404 - Denial of Service
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.238156 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.238156 | signature, permissions-required | |
https://forums.alliedmods.net/showthread.php?t=297179 | related | |
https://github.com/nikooo777/ckSurf/commit/fd6318d99083a06363091441a0614bd2f21068e6 | patch | |
https://github.com/nikooo777/ckSurf/releases/tag/1.21.0 | patch |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:45:26.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VDB-238156 | nikooo777 ckSurf Spectator List Name misc.sp SpecListMenuDead denial of service", "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.238156" }, { "name": "VDB-238156 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.238156" }, { "tags": [ "related", "x_transferred" ], "url": "https://forums.alliedmods.net/showthread.php?t=297179" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/nikooo777/ckSurf/commit/fd6318d99083a06363091441a0614bd2f21068e6" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/nikooo777/ckSurf/releases/tag/1.21.0" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-20186", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-01T13:49:10.611763Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-01T13:49:40.758Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Spectator List Name Handler" ], "product": "ckSurf", "vendor": "nikooo777", "versions": [ { "status": "affected", "version": "1.19.0" }, { "status": "affected", "version": "1.19.1" }, { "status": "affected", "version": "1.19.2" } ] } ], "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in nikooo777 ckSurf up to 1.19.2. It has been declared as problematic. This vulnerability affects the function SpecListMenuDead of the file csgo/addons/sourcemod/scripting/ckSurf/misc.sp of the component Spectator List Name Handler. The manipulation of the argument cleanName leads to denial of service. Upgrading to version 1.21.0 is able to address this issue. The name of the patch is fd6318d99083a06363091441a0614bd2f21068e6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-238156. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." }, { "lang": "de", "value": "In nikooo777 ckSurf bis 1.19.2 wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Das betrifft die Funktion SpecListMenuDead der Datei csgo/addons/sourcemod/scripting/ckSurf/misc.sp der Komponente Spectator List Name Handler. Mittels Manipulieren des Arguments cleanName mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 1.21.0 vermag dieses Problem zu l\u00f6sen. Der Patch wird als fd6318d99083a06363091441a0614bd2f21068e6 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 2.7, "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-29T06:58:54.692Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-238156 | nikooo777 ckSurf Spectator List Name misc.sp SpecListMenuDead denial of service", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.238156" }, { "name": "VDB-238156 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.238156" }, { "tags": [ "related" ], "url": "https://forums.alliedmods.net/showthread.php?t=297179" }, { "tags": [ "patch" ], "url": "https://github.com/nikooo777/ckSurf/commit/fd6318d99083a06363091441a0614bd2f21068e6" }, { "tags": [ "patch" ], "url": "https://github.com/nikooo777/ckSurf/releases/tag/1.21.0" } ], "tags": [ "unsupported-when-assigned" ], "timeline": [ { "lang": "en", "time": "2017-05-08T00:00:00.000Z", "value": "Countermeasure disclosed" }, { "lang": "en", "time": "2017-07-05T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-08-26T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-08-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-09-20T17:12:02.000Z", "value": "VulDB entry last update" } ], "title": "nikooo777 ckSurf Spectator List Name misc.sp SpecListMenuDead denial of service" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2017-20186", "datePublished": "2023-08-28T12:31:03.799Z", "dateReserved": "2023-08-26T20:07:55.285Z", "dateUpdated": "2025-07-01T13:49:40.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-13978 (GCVE-0-2024-13978)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.318355 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.318355 | signature, permissions-required | |
https://vuldb.com/?submit.624562 | third-party-advisory | |
https://gitlab.com/libtiff/libtiff/-/issues/649 | issue-tracking | |
https://gitlab.com/libtiff/libtiff/-/merge_requests/667 | patch | |
https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 | patch | |
http://www.libtiff.org/ | product |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-13978", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-04T14:24:36.801005Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-04T14:24:50.545Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://gitlab.com/libtiff/libtiff/-/issues/649" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "fax2ps" ], "product": "LibTIFF", "vendor": "n/a", "versions": [ { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.2" }, { "status": "affected", "version": "4.3" }, { "status": "affected", "version": "4.4" }, { "status": "affected", "version": "4.5" }, { "status": "affected", "version": "4.6" }, { "status": "affected", "version": "4.7.0" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "arthurx (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "In LibTIFF bis 4.7.0 wurde eine problematische Schwachstelle ausgemacht. Es geht um die Funktion t2p_read_tiff_init der Datei tools/tiff2pdf.c der Komponente fax2ps. Durch Manipulation mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Patch wird als 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 2, "baseSeverity": "LOW", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1, "vectorString": "AV:L/AC:H/Au:S/C:N/I:N/A:P/E:ND/RL:OF/RC:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T21:32:07.643Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-318355 | LibTIFF fax2ps tiff2pdf.c t2p_read_tiff_init null pointer dereference", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.318355" }, { "name": "VDB-318355 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.318355" }, { "name": "Submit #624562 | LibTIFF v4.7.0 NULL Pointer Dereference", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.624562" }, { "tags": [ "issue-tracking" ], "url": "https://gitlab.com/libtiff/libtiff/-/issues/649" }, { "tags": [ "patch" ], "url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/667" }, { "tags": [ "patch" ], "url": "https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4" }, { "tags": [ "product" ], "url": "http://www.libtiff.org/" } ], "timeline": [ { "lang": "en", "time": "2025-07-30T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-07-30T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-07-30T19:52:01.000Z", "value": "VulDB entry last update" } ], "title": "LibTIFF fax2ps tiff2pdf.c t2p_read_tiff_init null pointer dereference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2024-13978", "datePublished": "2025-08-01T21:32:07.643Z", "dateReserved": "2025-07-30T17:46:25.713Z", "dateUpdated": "2025-08-04T14:24:50.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23930 (GCVE-0-2024-23930)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Pioneer | DMH-WT7600NEX |
Version: all versions ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23930", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-31T15:19:07.179275Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-26T20:58:21.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DMH-WT7600NEX", "vendor": "Pioneer", "versions": [ { "status": "affected", "version": "all versions", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "NCC Group EDG reported to ZDI" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.\u003c/p\u003e\u003cp\u003eThe specific flaw exists within the Media service, which listens on TCP port 42000 by default. The issue results from improper handling of error conditions. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.\u003c/p\u003e" } ], "value": "This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Media service, which listens on TCP port 42000 by default. The issue results from improper handling of error conditions. An attacker can leverage this vulnerability to create a denial-of-service condition on the system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-30T17:28:19.529Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1043/" }, { "url": "https://jpn.pioneer/ja/car/dl/dmh-sz700_sf700/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Pioneer DMH-WT7600NEX Media Service Improper Handling of Exceptional Conditions", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application\u003cbr\u003e" } ], "value": "Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application" } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-23930", "datePublished": "2025-01-31T00:01:54.514Z", "dateReserved": "2024-01-23T21:45:30.919Z", "dateUpdated": "2025-08-26T20:58:21.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10475 (GCVE-0-2025-10475)
Vulnerability from cvelistv5
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
5.5 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
- CWE-404 - Denial of Service
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323906 | vdb-entry | |
https://vuldb.com/?ctiid.323906 | signature, permissions-required | |
https://vuldb.com/?submit.648484 | third-party-advisory | |
https://www.yuque.com/u28538081/sea4q5/aokhgdfpf5ueguk5 | exploit | |
https://www.spyshelter.com/help/SpyShelter-Changelog#15401028-3sep2025 | release-notes |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | SpyShelter |
Version: 15.4.0.1015 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10475", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-15T20:13:46.150738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-15T20:14:24.220Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "IOCTL Handler" ], "product": "SpyShelter", "vendor": "n/a", "versions": [ { "status": "affected", "version": "15.4.0.1015" }, { "status": "unaffected", "version": "15.4.0.1028" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Evan_xuan (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A weakness has been identified in SpyShelter up to 15.4.0.1015. Affected is an unknown function in the library SpyShelter.sys of the component IOCTL Handler. This manipulation causes denial of service. The attack needs to be launched locally. The exploit has been made available to the public and could be exploited. Upgrading to version 15.4.0.1028 is able to address this issue. It is advisable to upgrade the affected component." }, { "lang": "de", "value": "In SpyShelter bis 15.4.0.1015 wurde eine Schwachstelle gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion in der Bibliothek SpyShelter.sys der Komponente IOCTL Handler. Mit der Manipulation mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden. Das Problem kann durch ein Upgrade auf Version 15.4.0.1028 adressiert werden. Es wird empfohlen, die betroffene Komponente zu aktualisieren." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C/E:POC/RL:OF/RC:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T20:02:08.772Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323906 | SpyShelter IOCTL SpyShelter.sys denial of service", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.323906" }, { "name": "VDB-323906 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323906" }, { "name": "Submit #648484 | SpyShelter \u003c=15.4.0.1012 Local Privilege Escalation", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.648484" }, { "tags": [ "exploit" ], "url": "https://www.yuque.com/u28538081/sea4q5/aokhgdfpf5ueguk5" }, { "tags": [ "release-notes" ], "url": "https://www.spyshelter.com/help/SpyShelter-Changelog#15401028-3sep2025" } ], "timeline": [ { "lang": "en", "time": "2025-09-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-15T15:53:54.000Z", "value": "VulDB entry last update" } ], "title": "SpyShelter IOCTL SpyShelter.sys denial of service" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10475", "datePublished": "2025-09-15T20:02:08.772Z", "dateReserved": "2025-09-15T13:48:50.892Z", "dateUpdated": "2025-09-15T20:14:24.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20127 (GCVE-0-2025-20127)
Vulnerability from cvelistv5
- CWE-404 - Improper Resource Shutdown or Release
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: 9.20.1 Version: 9.20.1.5 Version: 9.20.2 Version: 9.20.2.10 Version: 9.20.2.21 Version: 9.20.2.22 Version: 9.20.3 Version: 9.22.1.1 Version: 9.20.3.4 Version: 9.20.3.7 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20127", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-14T18:41:43.684080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-14T19:21:36.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "9.20.1" }, { "status": "affected", "version": "9.20.1.5" }, { "status": "affected", "version": "9.20.2" }, { "status": "affected", "version": "9.20.2.10" }, { "status": "affected", "version": "9.20.2.21" }, { "status": "affected", "version": "9.20.2.22" }, { "status": "affected", "version": "9.20.3" }, { "status": "affected", "version": "9.22.1.1" }, { "status": "affected", "version": "9.20.3.4" }, { "status": "affected", "version": "9.20.3.7" } ] }, { "defaultStatus": "unknown", "product": "Cisco Firepower Threat Defense Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "7.4.0" }, { "status": "affected", "version": "7.4.1" }, { "status": "affected", "version": "7.4.1.1" }, { "status": "affected", "version": "7.4.2" }, { "status": "affected", "version": "7.6.0" }, { "status": "affected", "version": "7.4.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "Improper Resource Shutdown or Release", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T17:39:26.506Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-3100_4200_tlsdos-2yNSCd54", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54" } ], "source": { "advisory": "cisco-sa-3100_4200_tlsdos-2yNSCd54", "defects": [ "CSCwm91176" ], "discovery": "EXTERNAL" }, "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 3100 and 4200 Series TLS Cipher Denial of Service Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20127", "datePublished": "2025-08-14T16:28:07.785Z", "dateReserved": "2024-10-10T19:15:13.212Z", "dateUpdated": "2025-09-03T17:39:26.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-2926 (GCVE-0-2025-2926)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.301901 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.301901 | signature, permissions-required | |
https://vuldb.com/?submit.521246 | third-party-advisory | |
https://github.com/HDFGroup/hdf5/issues/5384 | exploit, issue-tracking |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2926", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-28T20:22:35.366625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-28T20:22:50.493Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/HDFGroup/hdf5/issues/5384" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "HDF5", "vendor": "n/a", "versions": [ { "status": "affected", "version": "1.14.0" }, { "status": "affected", "version": "1.14.1" }, { "status": "affected", "version": "1.14.2" }, { "status": "affected", "version": "1.14.3" }, { "status": "affected", "version": "1.14.4" }, { "status": "affected", "version": "1.14.5" }, { "status": "affected", "version": "1.14.6" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Chen Lihai" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in HDF5 up to 1.14.6 and classified as problematic. This issue affects the function H5O__cache_chk_serialize of the file src/H5Ocache.c. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in HDF5 bis 1.14.6 gefunden. Es geht hierbei um die Funktion H5O__cache_chk_serialize der Datei src/H5Ocache.c. Mittels Manipulieren mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-24T09:43:31.477Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-301901 | HDF5 H5Ocache.c H5O__cache_chk_serialize null pointer dereference", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.301901" }, { "name": "VDB-301901 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.301901" }, { "name": "Submit #521246 | https://github.com/HDFGroup/hdf5 HDF5 1.14.6 NULL Pointer Dereference", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.521246" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/HDFGroup/hdf5/issues/5384" } ], "timeline": [ { "lang": "en", "time": "2025-03-28T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-28T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-07-24T11:44:46.000Z", "value": "VulDB entry last update" } ], "title": "HDF5 H5Ocache.c H5O__cache_chk_serialize null pointer dereference" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2926", "datePublished": "2025-03-28T20:00:13.574Z", "dateReserved": "2025-03-28T11:56:29.079Z", "dateUpdated": "2025-07-24T09:43:31.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4444 (GCVE-0-2025-4444)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.324814 | vdb-entry | |
https://vuldb.com/?ctiid.324814 | signature, permissions-required | |
https://vuldb.com/?submit.640605 | third-party-advisory | |
https://github.com/chunmianwang/Tordos | related | |
https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes | release-notes | |
https://forum.torproject.org/t/alpha-and-stable-release-0-4-8-18-and-0-4-9-3-alpha/20578 | patch |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Tor |
Version: 0.4.7.0 Version: 0.4.7.1 Version: 0.4.7.2 Version: 0.4.7.3 Version: 0.4.7.4 Version: 0.4.7.5 Version: 0.4.7.6 Version: 0.4.7.7 Version: 0.4.7.8 Version: 0.4.7.9 Version: 0.4.7.10 Version: 0.4.7.11 Version: 0.4.7.12 Version: 0.4.7.13 Version: 0.4.7.14 Version: 0.4.7.15 Version: 0.4.7.16 Version: 0.4.8.0 Version: 0.4.8.1 Version: 0.4.8.2 Version: 0.4.8.3 Version: 0.4.8.4 Version: 0.4.8.5 Version: 0.4.8.6 Version: 0.4.8.7 Version: 0.4.8.8 Version: 0.4.8.9 Version: 0.4.8.10 Version: 0.4.8.11 Version: 0.4.8.12 Version: 0.4.8.13 Version: 0.4.8.14 Version: 0.4.8.15 Version: 0.4.8.16 Version: 0.4.8.17 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4444", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-18T20:41:11.076671Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-18T20:41:21.835Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Onion Service Descriptor Handler" ], "product": "Tor", "vendor": "n/a", "versions": [ { "status": "affected", "version": "0.4.7.0" }, { "status": "affected", "version": "0.4.7.1" }, { "status": "affected", "version": "0.4.7.2" }, { "status": "affected", "version": "0.4.7.3" }, { "status": "affected", "version": "0.4.7.4" }, { "status": "affected", "version": "0.4.7.5" }, { "status": "affected", "version": "0.4.7.6" }, { "status": "affected", "version": "0.4.7.7" }, { "status": "affected", "version": "0.4.7.8" }, { "status": "affected", "version": "0.4.7.9" }, { "status": "affected", "version": "0.4.7.10" }, { "status": "affected", "version": "0.4.7.11" }, { "status": "affected", "version": "0.4.7.12" }, { "status": "affected", "version": "0.4.7.13" }, { "status": "affected", "version": "0.4.7.14" }, { "status": "affected", "version": "0.4.7.15" }, { "status": "affected", "version": "0.4.7.16" }, { "status": "affected", "version": "0.4.8.0" }, { "status": "affected", "version": "0.4.8.1" }, { "status": "affected", "version": "0.4.8.2" }, { "status": "affected", "version": "0.4.8.3" }, { "status": "affected", "version": "0.4.8.4" }, { "status": "affected", "version": "0.4.8.5" }, { "status": "affected", "version": "0.4.8.6" }, { "status": "affected", "version": "0.4.8.7" }, { "status": "affected", "version": "0.4.8.8" }, { "status": "affected", "version": "0.4.8.9" }, { "status": "affected", "version": "0.4.8.10" }, { "status": "affected", "version": "0.4.8.11" }, { "status": "affected", "version": "0.4.8.12" }, { "status": "affected", "version": "0.4.8.13" }, { "status": "affected", "version": "0.4.8.14" }, { "status": "affected", "version": "0.4.8.15" }, { "status": "affected", "version": "0.4.8.16" }, { "status": "affected", "version": "0.4.8.17" }, { "status": "unaffected", "version": "0.4.8.18" }, { "status": "unaffected", "version": "0.4.9.3-alpha" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "wocanmei (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A security flaw has been discovered in Tor up to 0.4.7.16/0.4.8.17. Impacted is an unknown function of the component Onion Service Descriptor Handler. Performing manipulation results in resource consumption. The attack may be initiated remotely. The attack\u0027s complexity is rated as high. The exploitability is considered difficult. Upgrading to version 0.4.8.18 and 0.4.9.3-alpha is recommended to address this issue. It is recommended to upgrade the affected component." }, { "lang": "de", "value": "In Tor up to 0.4.7.16/0.4.8.17 wurde eine Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Komponente Onion Service Descriptor Handler. Dank der Manipulation mit unbekannten Daten kann eine resource consumption-Schwachstelle ausgenutzt werden. Der Angriff l\u00e4sst sich \u00fcber das Netzwerk starten. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Es wird angegeben, dass die Ausnutzbarkeit schwierig ist. Ein Upgrade auf Version 0.4.8.18 and 0.4.9.3-alpha ist in der Lage, dieses Problem zu adressieren. Die Aktualisierung der betroffenen Komponente wird empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-18T14:00:17.385Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-324814 | Tor Onion Service Descriptor resource consumption", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.324814" }, { "name": "VDB-324814 | CTI Indicators (IOB, IOC, TTP)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.324814" }, { "name": "Submit #640605 | Tor \u2264 0.4.8 Memory Management vulnerability", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.640605" }, { "tags": [ "related" ], "url": "https://github.com/chunmianwang/Tordos" }, { "tags": [ "release-notes" ], "url": "https://gitlab.torproject.org/tpo/core/tor/-/raw/release-0.4.8/ReleaseNotes" }, { "tags": [ "patch" ], "url": "https://forum.torproject.org/t/alpha-and-stable-release-0-4-8-18-and-0-4-9-3-alpha/20578" } ], "tags": [ "x_open-source" ], "timeline": [ { "lang": "en", "time": "2025-09-16T00:00:00.000Z", "value": "Countermeasure disclosed" }, { "lang": "en", "time": "2025-09-18T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-18T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-18T16:05:09.000Z", "value": "VulDB entry last update" } ], "title": "Tor Onion Service Descriptor resource consumption" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-4444", "datePublished": "2025-09-18T13:58:52.524Z", "dateReserved": "2025-05-08T17:01:45.724Z", "dateUpdated": "2025-09-18T20:41:21.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-48989 (GCVE-0-2025-48989)
Vulnerability from cvelistv5
- CWE-404 - Improper Resource Shutdown or Release
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf | vendor-advisory |
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 11.0.0-M1 ≤ 11.0.9 Version: 10.1.0-M1 ≤ 10.1.43 Version: 9.0.0.M1 ≤ 9.0.107 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-48989", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-13T18:37:15.707400Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T19:56:35.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "11.0.9", "status": "affected", "version": "11.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.43", "status": "affected", "version": "10.1.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "9.0.107", "status": "affected", "version": "9.0.0.M1", "versionType": "semver" }, { "lessThanOrEqual": "8.5.100", "status": "unknown", "version": "8.5.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel of Tel Aviv University" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.\u003c/p\u003e" } ], "value": "Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-13T12:11:26.124Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Tomcat: h2 DoS - Made You Reset", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-48989", "datePublished": "2025-08-13T12:11:26.124Z", "dateReserved": "2025-05-29T15:25:37.243Z", "dateUpdated": "2025-08-13T19:56:35.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49481 (GCVE-0-2025-49481)
Vulnerability from cvelistv5
- CWE-404 - Improper Resource Shutdown or Release
Vendor | Product | Version | ||
---|---|---|---|---|
ASR | Falcon_Linux、Kestrel、Lapwing_Linux |
Version: 0 < v1536 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49481", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-01T14:13:04.325646Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-01T14:14:27.249Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "router" ], "platforms": [ "Linux" ], "product": "Falcon_Linux\u3001Kestrel\u3001Lapwing_Linux", "programFiles": [ "router/phonebook/pbwork-queue.C" ], "vendor": "ASR", "versions": [ { "lessThan": "v1536", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-07-01T11:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Resource Shutdown or Release vulnerability in ASR180x \u3001ASR190x in router modules allows Resource Leak Exposure.\u003cp\u003e This vulnerability is associated with program files \u003ctt\u003erouter/phonebook/pbwork-queue.C\u003c/tt\u003e.\u003c/p\u003e\u003cp\u003eThis issue affects Falcon_Linux\u3001Kestrel\u3001Lapwing_Linux: before v1536.\u003c/p\u003e" } ], "value": "Improper Resource Shutdown or Release vulnerability in ASR180x \u3001ASR190x in router modules allows Resource Leak Exposure. This vulnerability is associated with program files router/phonebook/pbwork-queue.C.\n\nThis issue affects Falcon_Linux\u3001Kestrel\u3001Lapwing_Linux: before v1536." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-01T11:25:52.598Z", "orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae", "shortName": "ASR" }, "references": [ { "url": "https://www.asrmicro.com/en/goods/psirt?cid=40" } ], "source": { "discovery": "UNKNOWN" }, "title": "Resource leaks in router", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae", "assignerShortName": "ASR", "cveId": "CVE-2025-49481", "datePublished": "2025-07-01T11:20:24.105Z", "dateReserved": "2025-06-05T08:13:26.653Z", "dateUpdated": "2025-07-01T14:14:27.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-49482 (GCVE-0-2025-49482)
Vulnerability from cvelistv5
- CWE-404 - Improper Resource Shutdown or Release
Vendor | Product | Version | ||
---|---|---|---|---|
ASR | Falcon_Linux、Kestrel、Lapwing_Linux |
Version: 0 < v1536 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-49482", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-01T13:38:01.445397Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-01T13:47:26.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "tr069" ], "platforms": [ "Linux" ], "product": "Falcon_Linux\u3001Kestrel\u3001Lapwing_Linux", "programFiles": [ "tr069/tr098.c" ], "vendor": "ASR", "versions": [ { "lessThan": "v1536", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-07-01T11:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Resource Shutdown or Release vulnerability in ASR180x \u3001ASR190x in tr069 modules allows Resource Leak Exposure. \u003cbr\u003eThis vulnerability is associated with program files tr069/tr098.c.\u003cbr\u003eThis issue affects Falcon_Linux\u3001Kestrel\u3001Lapwing_Linux: before v1536.\u003cp\u003e\u003c/p\u003e" } ], "value": "Improper Resource Shutdown or Release vulnerability in ASR180x \u3001ASR190x in tr069 modules allows Resource Leak Exposure. \nThis vulnerability is associated with program files tr069/tr098.c.\nThis issue affects Falcon_Linux\u3001Kestrel\u3001Lapwing_Linux: before v1536." } ], "impacts": [ { "capecId": "CAPEC-131", "descriptions": [ { "lang": "en", "value": "CAPEC-131 Resource Leak Exposure" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-404", "description": "CWE-404 Improper Resource Shutdown or Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-01T11:28:04.483Z", "orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae", "shortName": "ASR" }, "references": [ { "url": "https://www.asrmicro.com/en/goods/psirt?cid=40" } ], "source": { "discovery": "UNKNOWN" }, "title": "Resource leaks in tr069", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae", "assignerShortName": "ASR", "cveId": "CVE-2025-49482", "datePublished": "2025-07-01T11:28:04.483Z", "dateReserved": "2025-06-05T08:13:26.653Z", "dateUpdated": "2025-07-01T13:47:26.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-3
Phase: Requirements
Strategy: Language Selection
Description:
- Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
- For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.
Mitigation
Phase: Implementation
Description:
- It is good practice to be responsible for freeing all resources you allocate and to be consistent with how and where you free memory in a function. If you allocate memory that you intend to free upon completion of the function, you must be sure to free the memory at all exit points for that function including error conditions.
Mitigation
Phase: Implementation
Description:
- Memory should be allocated/freed using matching functions such as malloc/free, new/delete, and new[]/delete[].
Mitigation
Phase: Implementation
Description:
- When releasing a complex object or structure, ensure that you properly dispose of all of its member components, not just the object itself.
CAPEC-125: Flooding
An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adversary can make in a given period of time. The greater this number, the more likely an attack is to succeed against a given target.
CAPEC-130: Excessive Allocation
An adversary causes the target to allocate excessive resources to servicing the attackers' request, thereby reducing the resources available for legitimate services and degrading or denying services. Usually, this attack focuses on memory allocation, but any finite resource on the target could be the attacked, including bandwidth, processing cycles, or other resources. This attack does not attempt to force this allocation through a large number of requests (that would be Resource Depletion through Flooding) but instead uses one or a small number of requests that are carefully formatted to force the target to allocate excessive resources to service this request(s). Often this attack takes advantage of a bug in the target to cause the target to allocate resources vastly beyond what would be needed for a normal request.
CAPEC-131: Resource Leak Exposure
An adversary utilizes a resource leak on the target to deplete the quantity of the resource available to service legitimate requests.
CAPEC-494: TCP Fragmentation
An adversary may execute a TCP Fragmentation attack against a target with the intention of avoiding filtering rules of network controls, by attempting to fragment the TCP packet such that the headers flag field is pushed into the second fragment which typically is not filtered.
CAPEC-495: UDP Fragmentation
An attacker may execute a UDP Fragmentation attack against a target server in an attempt to consume resources such as bandwidth and CPU. IP fragmentation occurs when an IP datagram is larger than the MTU of the route the datagram has to traverse. Typically the attacker will use large UDP packets over 1500 bytes of data which forces fragmentation as ethernet MTU is 1500 bytes. This attack is a variation on a typical UDP flood but it enables more network bandwidth to be consumed with fewer packets. Additionally it has the potential to consume server CPU resources and fill memory buffers associated with the processing and reassembling of fragmented packets.
CAPEC-496: ICMP Fragmentation
An attacker may execute a ICMP Fragmentation attack against a target with the intention of consuming resources or causing a crash. The attacker crafts a large number of identical fragmented IP packets containing a portion of a fragmented ICMP message. The attacker these sends these messages to a target host which causes the host to become non-responsive. Another vector may be sending a fragmented ICMP message to a target host with incorrect sizes in the header which causes the host to hang.
CAPEC-666: BlueSmacking
An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.