ID |
CVE-2020-11105
|
Summary |
An issue was discovered in USC iLab cereal through 1.3.0. It employs caching of std::shared_ptr values, using the raw pointer address as a unique identifier. This becomes problematic if an std::shared_ptr variable goes out of scope and is freed, and a new std::shared_ptr is allocated at the same address. Serialization fidelity thereby becomes dependent upon memory layout. In short, serialized std::shared_ptr variables cannot always be expected to serialize back into their original values. This can have any number of consequences, depending on the context within which this manifests. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:usc:cereal:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:0.9.0:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:0.9.1:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.1.0:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.1.1:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.1.2:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.2.0:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.2.1:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.2.2:*:*:*:*:*:*:*
-
cpe:2.3:a:usc:cereal:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:usc:cereal:1.3.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 01-04-2020 - 20:11) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-763 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
|
Last major update |
01-04-2020 - 20:11 |
Published |
30-03-2020 - 22:15 |
Last modified |
01-04-2020 - 20:11 |