BDU:2017-01479
Vulnerability from fstec - Published: 18.06.2017
VLAI Severity ?
Title
Уязвимость в реализации механизма Stack Guard-Page ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость в реализации механизма Stack Guard-Page ядра операционной системы Linux связана с возможностью перемещения указателя стека в другую область памяти, не затрагивая при этом сторожевую страницу. Эксплуатация уязвимости может позволить нарушителю, действующему локально, вызвать отказ в обслуживании (повреждение памяти)
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Linux
Software Version
от 4.0 до 4.1.41 включительно (Linux), от 4.2 до 4.4.73 включительно (Linux), от 4.5 до 4.9.33 включительно (Linux), от 4.10 до 4.11.6 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34
Reference
http://www.debian.org/security/2017/dsa-3886
http://www.securityfocus.com/bid/99130
http://www.securitytracker.com/id/1038724
http://www.ubuntu.com/usn/usn-3324-1
http://www.ubuntu.com/usn/usn-3325-1
http://www.ubuntu.com/usn/usn-3326-1
http://www.ubuntu.com/usn/usn-3327-1
http://www.ubuntu.com/usn/usn-3328-1
http://www.ubuntu.com/usn/usn-3329-1
http://www.ubuntu.com/usn/usn-3330-1
http://www.ubuntu.com/usn/usn-3331-1
http://www.ubuntu.com/usn/usn-3332-1
http://www.ubuntu.com/usn/usn-3333-1
http://www.ubuntu.com/usn/usn-3334-1
http://www.ubuntu.com/usn/usn-3335-1
http://www.ubuntu.com/usn/usn-3335-2
http://www.ubuntu.com/usn/usn-3338-1
https://access.redhat.com/errata/RHSA-2017:1482
https://access.redhat.com/errata/RHSA-2017:1483
https://access.redhat.com/errata/RHSA-2017:1484
https://access.redhat.com/errata/RHSA-2017:1485
https://access.redhat.com/errata/RHSA-2017:1486
https://access.redhat.com/errata/RHSA-2017:1487
https://access.redhat.com/errata/RHSA-2017:1488
https://access.redhat.com/errata/RHSA-2017:1489
https://access.redhat.com/errata/RHSA-2017:1490
https://access.redhat.com/errata/RHSA-2017:1491
https://access.redhat.com/errata/RHSA-2017:1567
https://access.redhat.com/errata/RHSA-2017:1616
https://access.redhat.com/errata/RHSA-2017:1647
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/security/cve/CVE-2017-1000364
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
https://kc.mcafee.com/corporate/index?page=content&id=SB10205
https://kc.mcafee.com/corporate/index?page=content&id=SB10207
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34
https://launchpad.net/bugs/1698919
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us
https://ubuntu.com/security/notices/USN-3324-1
https://ubuntu.com/security/notices/USN-3325-1
https://ubuntu.com/security/notices/USN-3326-1
https://ubuntu.com/security/notices/USN-3327-1
https://ubuntu.com/security/notices/USN-3328-1
https://ubuntu.com/security/notices/USN-3329-1
https://ubuntu.com/security/notices/USN-3330-1
https://ubuntu.com/security/notices/USN-3331-1
https://ubuntu.com/security/notices/USN-3332-1
https://ubuntu.com/security/notices/USN-3333-1
https://ubuntu.com/security/notices/USN-3334-1
https://ubuntu.com/security/notices/USN-3335-1
https://ubuntu.com/security/notices/USN-3335-2
https://ubuntu.com/security/notices/USN-3338-1
https://usn.ubuntu.com/usn/usn-3324-1
https://usn.ubuntu.com/usn/usn-3325-1
https://usn.ubuntu.com/usn/usn-3326-1
https://usn.ubuntu.com/usn/usn-3327-1
https://usn.ubuntu.com/usn/usn-3328-1
https://usn.ubuntu.com/usn/usn-3329-1
https://usn.ubuntu.com/usn/usn-3330-1
https://usn.ubuntu.com/usn/usn-3331-1
https://usn.ubuntu.com/usn/usn-3332-1
https://usn.ubuntu.com/usn/usn-3333-1
https://usn.ubuntu.com/usn/usn-3334-1
https://usn.ubuntu.com/usn/usn-3335-1
https://usn.ubuntu.com/usn/usn-3335-2
https://usn.ubuntu.com/usn/usn-3338-1
https://www.cve.org/CVERecord?id=CVE-2017-1000364
https://www.exploit-db.com/exploits/45625/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://www.suse.com/security/cve/CVE-2017-1000364/
https://www.suse.com/support/kb/doc/?id=7020973
CWE
CWE-119
{
"CVSS 2.0": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 4.0 \u0434\u043e 4.1.41 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.2 \u0434\u043e 4.4.73 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.33 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.11.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.06.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.06.2017",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2017-01479",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-1000364",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 Stack Guard-Page \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 Stack Guard-Page \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f \u0441\u0442\u0435\u043a\u0430 \u0432 \u0434\u0440\u0443\u0433\u0443\u044e \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u043f\u0430\u043c\u044f\u0442\u0438, \u043d\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u0442\u043e\u0440\u043e\u0436\u0435\u0432\u0443\u044e \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (\u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438)",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.debian.org/security/2017/dsa-3886\nhttp://www.securityfocus.com/bid/99130\nhttp://www.securitytracker.com/id/1038724\nhttp://www.ubuntu.com/usn/usn-3324-1\nhttp://www.ubuntu.com/usn/usn-3325-1\nhttp://www.ubuntu.com/usn/usn-3326-1\nhttp://www.ubuntu.com/usn/usn-3327-1\nhttp://www.ubuntu.com/usn/usn-3328-1\nhttp://www.ubuntu.com/usn/usn-3329-1\nhttp://www.ubuntu.com/usn/usn-3330-1\nhttp://www.ubuntu.com/usn/usn-3331-1\nhttp://www.ubuntu.com/usn/usn-3332-1\nhttp://www.ubuntu.com/usn/usn-3333-1\nhttp://www.ubuntu.com/usn/usn-3334-1\nhttp://www.ubuntu.com/usn/usn-3335-1\nhttp://www.ubuntu.com/usn/usn-3335-2\nhttp://www.ubuntu.com/usn/usn-3338-1\nhttps://access.redhat.com/errata/RHSA-2017:1482\nhttps://access.redhat.com/errata/RHSA-2017:1483\nhttps://access.redhat.com/errata/RHSA-2017:1484\nhttps://access.redhat.com/errata/RHSA-2017:1485\nhttps://access.redhat.com/errata/RHSA-2017:1486\nhttps://access.redhat.com/errata/RHSA-2017:1487\nhttps://access.redhat.com/errata/RHSA-2017:1488\nhttps://access.redhat.com/errata/RHSA-2017:1489\nhttps://access.redhat.com/errata/RHSA-2017:1490\nhttps://access.redhat.com/errata/RHSA-2017:1491\nhttps://access.redhat.com/errata/RHSA-2017:1567\nhttps://access.redhat.com/errata/RHSA-2017:1616\nhttps://access.redhat.com/errata/RHSA-2017:1647\nhttps://access.redhat.com/errata/RHSA-2017:1712\nhttps://access.redhat.com/security/cve/CVE-2017-1000364\nhttps://bugs.launchpad.net/ubuntu/+source/linux/+bug/1699772\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10207\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.42\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.7\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.74\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.34\nhttps://launchpad.net/bugs/1698919\nhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03800en_us\nhttps://ubuntu.com/security/notices/USN-3324-1\nhttps://ubuntu.com/security/notices/USN-3325-1\nhttps://ubuntu.com/security/notices/USN-3326-1\nhttps://ubuntu.com/security/notices/USN-3327-1\nhttps://ubuntu.com/security/notices/USN-3328-1\nhttps://ubuntu.com/security/notices/USN-3329-1\nhttps://ubuntu.com/security/notices/USN-3330-1\nhttps://ubuntu.com/security/notices/USN-3331-1\nhttps://ubuntu.com/security/notices/USN-3332-1\nhttps://ubuntu.com/security/notices/USN-3333-1\nhttps://ubuntu.com/security/notices/USN-3334-1\nhttps://ubuntu.com/security/notices/USN-3335-1\nhttps://ubuntu.com/security/notices/USN-3335-2\nhttps://ubuntu.com/security/notices/USN-3338-1\nhttps://usn.ubuntu.com/usn/usn-3324-1\nhttps://usn.ubuntu.com/usn/usn-3325-1\nhttps://usn.ubuntu.com/usn/usn-3326-1\nhttps://usn.ubuntu.com/usn/usn-3327-1\nhttps://usn.ubuntu.com/usn/usn-3328-1\nhttps://usn.ubuntu.com/usn/usn-3329-1\nhttps://usn.ubuntu.com/usn/usn-3330-1\nhttps://usn.ubuntu.com/usn/usn-3331-1\nhttps://usn.ubuntu.com/usn/usn-3332-1\nhttps://usn.ubuntu.com/usn/usn-3333-1\nhttps://usn.ubuntu.com/usn/usn-3334-1\nhttps://usn.ubuntu.com/usn/usn-3335-1\nhttps://usn.ubuntu.com/usn/usn-3335-2\nhttps://usn.ubuntu.com/usn/usn-3338-1\nhttps://www.cve.org/CVERecord?id=CVE-2017-1000364\nhttps://www.exploit-db.com/exploits/45625/\nhttps://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt\nhttps://www.suse.com/security/cve/CVE-2017-1000364/\nhttps://www.suse.com/support/kb/doc/?id=7020973",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,4)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…