BDU:2017-01479

Vulnerability from fstec - Published: 18.06.2017
VLAI Severity ?
Title
Уязвимость в реализации механизма Stack Guard-Page ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость в реализации механизма Stack Guard-Page ядра операционной системы Linux связана с возможностью перемещения указателя стека в другую область памяти, не затрагивая при этом сторожевую страницу. Эксплуатация уязвимости может позволить нарушителю, действующему локально, вызвать отказ в обслуживании (повреждение памяти)
Vendor
Сообщество свободного программного обеспечения
Software Name
Linux
Software Version
от 4.0 до 4.1.41 включительно (Linux), от 4.2 до 4.4.73 включительно (Linux), от 4.5 до 4.9.33 включительно (Linux), от 4.10 до 4.11.6 включительно (Linux)
Possible Mitigations
Использование рекомендаций: Для Linux: https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34
Reference
http://www.debian.org/security/2017/dsa-3886 http://www.securityfocus.com/bid/99130 http://www.securitytracker.com/id/1038724 http://www.ubuntu.com/usn/usn-3324-1 http://www.ubuntu.com/usn/usn-3325-1 http://www.ubuntu.com/usn/usn-3326-1 http://www.ubuntu.com/usn/usn-3327-1 http://www.ubuntu.com/usn/usn-3328-1 http://www.ubuntu.com/usn/usn-3329-1 http://www.ubuntu.com/usn/usn-3330-1 http://www.ubuntu.com/usn/usn-3331-1 http://www.ubuntu.com/usn/usn-3332-1 http://www.ubuntu.com/usn/usn-3333-1 http://www.ubuntu.com/usn/usn-3334-1 http://www.ubuntu.com/usn/usn-3335-1 http://www.ubuntu.com/usn/usn-3335-2 http://www.ubuntu.com/usn/usn-3338-1 https://access.redhat.com/errata/RHSA-2017:1482 https://access.redhat.com/errata/RHSA-2017:1483 https://access.redhat.com/errata/RHSA-2017:1484 https://access.redhat.com/errata/RHSA-2017:1485 https://access.redhat.com/errata/RHSA-2017:1486 https://access.redhat.com/errata/RHSA-2017:1487 https://access.redhat.com/errata/RHSA-2017:1488 https://access.redhat.com/errata/RHSA-2017:1489 https://access.redhat.com/errata/RHSA-2017:1490 https://access.redhat.com/errata/RHSA-2017:1491 https://access.redhat.com/errata/RHSA-2017:1567 https://access.redhat.com/errata/RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1712 https://access.redhat.com/security/cve/CVE-2017-1000364 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699772 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364 https://kc.mcafee.com/corporate/index?page=content&id=SB10205 https://kc.mcafee.com/corporate/index?page=content&id=SB10207 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34 https://launchpad.net/bugs/1698919 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us https://ubuntu.com/security/notices/USN-3324-1 https://ubuntu.com/security/notices/USN-3325-1 https://ubuntu.com/security/notices/USN-3326-1 https://ubuntu.com/security/notices/USN-3327-1 https://ubuntu.com/security/notices/USN-3328-1 https://ubuntu.com/security/notices/USN-3329-1 https://ubuntu.com/security/notices/USN-3330-1 https://ubuntu.com/security/notices/USN-3331-1 https://ubuntu.com/security/notices/USN-3332-1 https://ubuntu.com/security/notices/USN-3333-1 https://ubuntu.com/security/notices/USN-3334-1 https://ubuntu.com/security/notices/USN-3335-1 https://ubuntu.com/security/notices/USN-3335-2 https://ubuntu.com/security/notices/USN-3338-1 https://usn.ubuntu.com/usn/usn-3324-1 https://usn.ubuntu.com/usn/usn-3325-1 https://usn.ubuntu.com/usn/usn-3326-1 https://usn.ubuntu.com/usn/usn-3327-1 https://usn.ubuntu.com/usn/usn-3328-1 https://usn.ubuntu.com/usn/usn-3329-1 https://usn.ubuntu.com/usn/usn-3330-1 https://usn.ubuntu.com/usn/usn-3331-1 https://usn.ubuntu.com/usn/usn-3332-1 https://usn.ubuntu.com/usn/usn-3333-1 https://usn.ubuntu.com/usn/usn-3334-1 https://usn.ubuntu.com/usn/usn-3335-1 https://usn.ubuntu.com/usn/usn-3335-2 https://usn.ubuntu.com/usn/usn-3338-1 https://www.cve.org/CVERecord?id=CVE-2017-1000364 https://www.exploit-db.com/exploits/45625/ https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt https://www.suse.com/security/cve/CVE-2017-1000364/ https://www.suse.com/support/kb/doc/?id=7020973
CWE
CWE-119

{
  "CVSS 2.0": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
  "CVSS 3.0": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 4.0 \u0434\u043e 4.1.41 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.2 \u0434\u043e 4.4.73 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.33 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.11.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.06.2017",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.05.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.06.2017",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2017-01479",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-1000364",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 Stack Guard-Page \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 Stack Guard-Page \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f \u0441\u0442\u0435\u043a\u0430 \u0432 \u0434\u0440\u0443\u0433\u0443\u044e \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u0438, \u043d\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u0442\u043e\u0440\u043e\u0436\u0435\u0432\u0443\u044e \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (\u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438)",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.debian.org/security/2017/dsa-3886\nhttp://www.securityfocus.com/bid/99130\nhttp://www.securitytracker.com/id/1038724\nhttp://www.ubuntu.com/usn/usn-3324-1\nhttp://www.ubuntu.com/usn/usn-3325-1\nhttp://www.ubuntu.com/usn/usn-3326-1\nhttp://www.ubuntu.com/usn/usn-3327-1\nhttp://www.ubuntu.com/usn/usn-3328-1\nhttp://www.ubuntu.com/usn/usn-3329-1\nhttp://www.ubuntu.com/usn/usn-3330-1\nhttp://www.ubuntu.com/usn/usn-3331-1\nhttp://www.ubuntu.com/usn/usn-3332-1\nhttp://www.ubuntu.com/usn/usn-3333-1\nhttp://www.ubuntu.com/usn/usn-3334-1\nhttp://www.ubuntu.com/usn/usn-3335-1\nhttp://www.ubuntu.com/usn/usn-3335-2\nhttp://www.ubuntu.com/usn/usn-3338-1\nhttps://access.redhat.com/errata/RHSA-2017:1482\nhttps://access.redhat.com/errata/RHSA-2017:1483\nhttps://access.redhat.com/errata/RHSA-2017:1484\nhttps://access.redhat.com/errata/RHSA-2017:1485\nhttps://access.redhat.com/errata/RHSA-2017:1486\nhttps://access.redhat.com/errata/RHSA-2017:1487\nhttps://access.redhat.com/errata/RHSA-2017:1488\nhttps://access.redhat.com/errata/RHSA-2017:1489\nhttps://access.redhat.com/errata/RHSA-2017:1490\nhttps://access.redhat.com/errata/RHSA-2017:1491\nhttps://access.redhat.com/errata/RHSA-2017:1567\nhttps://access.redhat.com/errata/RHSA-2017:1616\nhttps://access.redhat.com/errata/RHSA-2017:1647\nhttps://access.redhat.com/errata/RHSA-2017:1712\nhttps://access.redhat.com/security/cve/CVE-2017-1000364\nhttps://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699772\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10207\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34\nhttps://launchpad.net/bugs/1698919\nhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03800en_us\nhttps://ubuntu.com/security/notices/USN-3324-1\nhttps://ubuntu.com/security/notices/USN-3325-1\nhttps://ubuntu.com/security/notices/USN-3326-1\nhttps://ubuntu.com/security/notices/USN-3327-1\nhttps://ubuntu.com/security/notices/USN-3328-1\nhttps://ubuntu.com/security/notices/USN-3329-1\nhttps://ubuntu.com/security/notices/USN-3330-1\nhttps://ubuntu.com/security/notices/USN-3331-1\nhttps://ubuntu.com/security/notices/USN-3332-1\nhttps://ubuntu.com/security/notices/USN-3333-1\nhttps://ubuntu.com/security/notices/USN-3334-1\nhttps://ubuntu.com/security/notices/USN-3335-1\nhttps://ubuntu.com/security/notices/USN-3335-2\nhttps://ubuntu.com/security/notices/USN-3338-1\nhttps://usn.ubuntu.com/usn/usn-3324-1\nhttps://usn.ubuntu.com/usn/usn-3325-1\nhttps://usn.ubuntu.com/usn/usn-3326-1\nhttps://usn.ubuntu.com/usn/usn-3327-1\nhttps://usn.ubuntu.com/usn/usn-3328-1\nhttps://usn.ubuntu.com/usn/usn-3329-1\nhttps://usn.ubuntu.com/usn/usn-3330-1\nhttps://usn.ubuntu.com/usn/usn-3331-1\nhttps://usn.ubuntu.com/usn/usn-3332-1\nhttps://usn.ubuntu.com/usn/usn-3333-1\nhttps://usn.ubuntu.com/usn/usn-3334-1\nhttps://usn.ubuntu.com/usn/usn-3335-1\nhttps://usn.ubuntu.com/usn/usn-3335-2\nhttps://usn.ubuntu.com/usn/usn-3338-1\nhttps://www.cve.org/CVERecord?id=CVE-2017-1000364\nhttps://www.exploit-db.com/exploits/45625/\nhttps://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt\nhttps://www.suse.com/security/cve/CVE-2017-1000364/\nhttps://www.suse.com/support/kb/doc/?id=7020973",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,4)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…