Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-36759 (GCVE-0-2023-36759)
Vulnerability from cvelistv5
- CWE-822 - Untrusted Pointer Dereference
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759 | Patch, Vendor Advisory |
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Microsoft Visual Studio 2022 version 17.2 |
Version: 17.2.0 < 17.2.19 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:09.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Visual Studio Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Unknown" ], "product": "Microsoft Visual Studio 2022 version 17.2", "vendor": "Microsoft", "versions": [ { "lessThan": "17.2.19", "status": "affected", "version": "17.2.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)", "vendor": "Microsoft", "versions": [ { "lessThan": "16.11.30", "status": "affected", "version": "16.11.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Microsoft Visual Studio 2022 version 17.4", "vendor": "Microsoft", "versions": [ { "lessThan": "17.4.11", "status": "affected", "version": "17.4.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Microsoft Visual Studio 2022 version 17.7", "vendor": "Microsoft", "versions": [ { "lessThan": "17.7.4", "status": "affected", "version": "17.7.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Microsoft Visual Studio 2022 version 17.6", "vendor": "Microsoft", "versions": [ { "lessThan": "17.6.7", "status": "affected", "version": "17.6.0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.2.19", "versionStartIncluding": "17.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.11.30", "versionStartIncluding": "16.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.4.11", "versionStartIncluding": "17.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.7.4", "versionStartIncluding": "17.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.6.7", "versionStartIncluding": "17.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2023-09-12T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Visual Studio Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "CWE-822: Untrusted Pointer Dereference", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-01T02:04:21.736Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Visual Studio Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ], "title": "Visual Studio Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2023-36759", "datePublished": "2023-09-12T16:58:29.748Z", "dateReserved": "2023-06-27T15:11:59.867Z", "dateUpdated": "2025-01-01T02:04:21.736Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-36759\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2023-09-12T17:15:11.513\",\"lastModified\":\"2024-11-21T08:10:32.297\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Visual Studio Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de Elevaci\u00f3n de Privilegios en Visual Studio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-822\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"16.11.30\",\"matchCriteriaId\":\"40434953-906B-453E-9F4C-46BF0F693E06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.2.0\",\"versionEndExcluding\":\"17.2.19\",\"matchCriteriaId\":\"37E17676-8AD6-4FB1-8983-EB1CD4B888EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.4.0\",\"versionEndExcluding\":\"17.4.11\",\"matchCriteriaId\":\"B49C4225-E3D7-4FEF-AAB5-5866C897B6F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.6.0\",\"versionEndExcluding\":\"17.6.7\",\"matchCriteriaId\":\"B8C5B89F-287F-43BA-99B3-85B475B53CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.7.0\",\"versionEndExcluding\":\"17.7.4\",\"matchCriteriaId\":\"F041DA8F-B61D-4AF5-9248-22D68F38E74F\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
cnvd-2023-101685
Vulnerability from cnvd
Title: Microsoft Visual Studio权限提升漏洞(CNVD-2023-101685)
Description:
Microsoft Visual Studio是美国微软(Microsoft)公司的一款开发工具套件系列产品,也是一个基本完整的开发工具集,它包括了整个软件生命周期中所需要的大部分工具。
Microsoft Visual Studio存在权限提升漏洞,攻击者可利用该漏洞获取SYSTEM权限。
Severity: 中
Patch Name: Microsoft Visual Studio权限提升漏洞(CNVD-2023-101685)的补丁
Patch Description:
Microsoft Visual Studio是美国微软(Microsoft)公司的一款开发工具套件系列产品,也是一个基本完整的开发工具集,它包括了整个软件生命周期中所需要的大部分工具。
Microsoft Visual Studio存在权限提升漏洞,攻击者可利用该漏洞获取SYSTEM权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36759
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-36759
Name | ['Microsoft Visual Studio 2022 17.2', 'Microsoft Visual Studio 2022 17.4', 'Microsoft Visual Studio 2022 17.6', 'Microsoft Visual Studio 2022 17.7'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2023-36759", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-36759" } }, "description": "Microsoft Visual Studio\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5f00\u53d1\u5de5\u5177\u5957\u4ef6\u7cfb\u5217\u4ea7\u54c1\uff0c\u4e5f\u662f\u4e00\u4e2a\u57fa\u672c\u5b8c\u6574\u7684\u5f00\u53d1\u5de5\u5177\u96c6\uff0c\u5b83\u5305\u62ec\u4e86\u6574\u4e2a\u8f6f\u4ef6\u751f\u547d\u5468\u671f\u4e2d\u6240\u9700\u8981\u7684\u5927\u90e8\u5206\u5de5\u5177\u3002 \n\nMicrosoft Visual Studio\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6SYSTEM\u6743\u9650\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36759", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2023-101685", "openTime": "2023-12-29", "patchDescription": "Microsoft Visual Studio\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5f00\u53d1\u5de5\u5177\u5957\u4ef6\u7cfb\u5217\u4ea7\u54c1\uff0c\u4e5f\u662f\u4e00\u4e2a\u57fa\u672c\u5b8c\u6574\u7684\u5f00\u53d1\u5de5\u5177\u96c6\uff0c\u5b83\u5305\u62ec\u4e86\u6574\u4e2a\u8f6f\u4ef6\u751f\u547d\u5468\u671f\u4e2d\u6240\u9700\u8981\u7684\u5927\u90e8\u5206\u5de5\u5177\u3002 \r\n\r\nMicrosoft Visual Studio\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6SYSTEM\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Microsoft Visual Studio\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2023-101685\uff09\u7684\u8865\u4e01", "products": { "product": [ "Microsoft Visual Studio 2022 17.2", "Microsoft Visual Studio 2022 17.4", "Microsoft Visual Studio 2022 17.6", "Microsoft Visual Studio 2022 17.7" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-36759", "serverity": "\u4e2d", "submitTime": "2023-09-15", "title": "Microsoft Visual Studio\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2023-101685\uff09" }
gsd-2023-36759
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-36759", "id": "GSD-2023-36759" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-36759" ], "details": "Visual Studio Elevation of Privilege Vulnerability", "id": "GSD-2023-36759", "modified": "2023-12-13T01:20:34.047214Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2023-36759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Microsoft Visual Studio 2022 version 17.2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "17.2.0", "version_value": "17.2.19" } ] } }, { "product_name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "16.11.0", "version_value": "16.11.30" } ] } }, { "product_name": "Microsoft Visual Studio 2022 version 17.4", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "17.4.0", "version_value": "17.4.11" } ] } }, { "product_name": "Microsoft Visual Studio 2022 version 17.7", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "17.7.0", "version_value": "17.7.4" } ] } }, { "product_name": "Microsoft Visual Studio 2022 version 17.6", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "17.6.0", "version_value": "17.6.7" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Visual Studio Elevation of Privilege Vulnerability" } ] }, "impact": { "cvss": [ { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759", "refsource": "MISC", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "16.11.30", "versionStartIncluding": "16.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.2.19", "versionStartIncluding": "17.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.4.11", "versionStartIncluding": "17.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.6.7", "versionStartIncluding": "17.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "17.7.4", "versionStartIncluding": "17.7.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2023-36759" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Visual Studio Elevation of Privilege Vulnerability" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-09-15T00:00Z", "publishedDate": "2023-09-12T17:15Z" } } }
msrc_cve-2023-36759
Vulnerability from csaf_microsoft
Notes
{ "document": { "acknowledgments": [ { "names": [ "\u003ca href=\"https://github.com/zeze-zeze\"\u003eZeze\u003c/a\u003e with \u003ca href=\"https://teamt5.org/tw/\"\u003eTeamT5\u003c/a\u003e" ] } ], "aggregate_severity": { "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Public", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.", "title": "Disclaimer" }, { "category": "general", "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.", "title": "Customer Action" } ], "publisher": { "category": "vendor", "contact_details": "secure@microsoft.com", "name": "Microsoft Security Response Center", "namespace": "https://msrc.microsoft.com" }, "references": [ { "category": "self", "summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" }, { "category": "self", "summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - CSAF", "url": "https://msrc.microsoft.com/csaf/2023/msrc_cve-2023-36759.json" }, { "category": "external", "summary": "Microsoft Exploitability Index", "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1" }, { "category": "external", "summary": "Microsoft Support Lifecycle", "url": "https://support.microsoft.com/lifecycle" }, { "category": "external", "summary": "Common Vulnerability Scoring System", "url": "https://www.first.org/cvss" } ], "title": "Visual Studio Elevation of Privilege Vulnerability", "tracking": { "current_release_date": "2023-09-12T07:00:00.000Z", "generator": { "date": "2025-01-01T02:04:05.607Z", "engine": { "name": "MSRC Generator", "version": "1.0" } }, "id": "msrc_CVE-2023-36759", "initial_release_date": "2023-09-12T07:00:00.000Z", "revision_history": [ { "date": "2023-09-12T07:00:00.000Z", "legacy_version": "1", "number": "1", "summary": "Information published." } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c17.2.19", "product": { "name": "Microsoft Visual Studio 2022 version 17.2 \u003c17.2.19", "product_id": "4" } }, { "category": "product_version", "name": "17.2.19", "product": { "name": "Microsoft Visual Studio 2022 version 17.2 17.2.19", "product_id": "12051" } } ], "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.2" }, { "branches": [ { "category": "product_version_range", "name": "\u003c16.11.30", "product": { "name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) \u003c16.11.30", "product_id": "5" } }, { "category": "product_version", "name": "16.11.30", "product": { "name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) 16.11.30", "product_id": "11935" } } ], "category": "product_name", "name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)" }, { "branches": [ { "category": "product_version_range", "name": "\u003c17.4.11", "product": { "name": "Microsoft Visual Studio 2022 version 17.4 \u003c17.4.11", "product_id": "3" } }, { "category": "product_version", "name": "17.4.11", "product": { "name": "Microsoft Visual Studio 2022 version 17.4 17.4.11", "product_id": "12129" } } ], "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.4" }, { "branches": [ { "category": "product_version_range", "name": "\u003c17.7.4", "product": { "name": "Microsoft Visual Studio 2022 version 17.7 \u003c17.7.4", "product_id": "1" } }, { "category": "product_version", "name": "17.7.4", "product": { "name": "Microsoft Visual Studio 2022 version 17.7 17.7.4", "product_id": "12222" } } ], "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.7" }, { "branches": [ { "category": "product_version_range", "name": "\u003c17.6.7", "product": { "name": "Microsoft Visual Studio 2022 version 17.6 \u003c17.6.7", "product_id": "2" } }, { "category": "product_version", "name": "17.6.7", "product": { "name": "Microsoft Visual Studio 2022 version 17.6 17.6.7", "product_id": "12187" } } ], "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-36759", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "general", "text": "Microsoft", "title": "Assigning CNA" }, { "category": "faq", "text": "A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.", "title": "What privileges could be gained by an attacker who successfully exploited the vulnerability?" }, { "category": "faq", "text": "Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.", "title": "According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?" }, { "category": "faq", "text": "An authenticated attacker must send the victim a malicious file and convince them to open it.", "title": "According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?" } ], "product_status": { "fixed": [ "11935", "12051", "12129", "12187", "12222" ], "known_affected": [ "1", "2", "3", "4", "5" ] }, "references": [ { "category": "self", "summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - HTML", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" }, { "category": "self", "summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - CSAF", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ], "remediations": [ { "category": "vendor_fix", "date": "2023-09-12T07:00:00.000Z", "details": "17.2.19:Security Update:https://docs.microsoft.com/en-us/visualstudio/releases/2022/release-notes", "product_ids": [ "4" ], "url": "https://docs.microsoft.com/en-us/visualstudio/releases/2022/release-notes" }, { "category": "vendor_fix", "date": "2023-09-12T07:00:00.000Z", "details": "16.11.30:Security Update:https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.11", "product_ids": [ "5" ], "url": "https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.11" }, { "category": "vendor_fix", "date": "2023-09-12T07:00:00.000Z", "details": "17.4.11:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes", "product_ids": [ "3" ], "url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes" }, { "category": "vendor_fix", "date": "2023-09-12T07:00:00.000Z", "details": "17.7.4:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes", "product_ids": [ "1" ], "url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes" }, { "category": "vendor_fix", "date": "2023-09-12T07:00:00.000Z", "details": "17.6.7:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes", "product_ids": [ "2" ], "url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalsScore": 0.0, "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 5.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5" ] } ], "threats": [ { "category": "impact", "details": "Elevation of Privilege" }, { "category": "exploit_status", "details": "Exploited:No;Latest Software Release:Exploitation Less Likely" } ], "title": "Visual Studio Elevation of Privilege Vulnerability" } ] }
wid-sec-w-2023-2333
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Microsoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausf\u00fchrung von Softwareanwendungen und Webdiensten erm\u00f6glicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. f\u00fcr die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.\r\nMicrosoft Azure DevOps Server ist eine Plattform f\u00fcr kollaborative Softwareprojekte.\r\nMicrosoft Visual Studio ist eine integrierte Entwicklungsumgebung f\u00fcr Hochsprachen.\r\nVisual Studio Code ist ein Quelltext-Editor von Microsoft.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in verschiedenen Microsoft Developer Tools ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2333 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2333.json" }, { "category": "self", "summary": "WID-SEC-2023-2333 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2333" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6245 vom 2023-11-06", "url": "http://linux.oracle.com/errata/ELSA-2023-6245.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6242 vom 2023-11-03", "url": "https://linux.oracle.com/errata/ELSA-2023-6242.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6246 vom 2023-11-02", "url": "https://access.redhat.com/errata/RHSA-2023:6246" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6247 vom 2023-11-02", "url": "https://linux.oracle.com/errata/ELSA-2023-6247.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6246 vom 2023-11-03", "url": "https://linux.oracle.com/errata/ELSA-2023-6246.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6362-2 vom 2023-10-25", "url": "https://www.cybersecurity-help.cz/vdb/SB2023102524" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6438-2 vom 2023-10-25", "url": "https://ubuntu.com/security/notices/USN-6438-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5143 vom 2023-09-14", "url": "https://linux.oracle.com/errata/ELSA-2023-5143.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5144 vom 2023-09-14", "url": "https://linux.oracle.com/errata/ELSA-2023-5144.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14", "url": "https://linux.oracle.com/errata/ELSA-2023-5145.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5146 vom 2023-09-14", "url": "http://linux.oracle.com/errata/ELSA-2023-5146.html" }, { "category": "external", "summary": "PoC Exploit vom 2023-11-06", "url": "https://securityonline.info/poc-exploit-published-for-visual-studio-code-rce-vulnerability-cve-2023-36742/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14", "url": "http://linux.oracle.com/errata/ELSA-2023-5145.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5146 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5145 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5145" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5142 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5142" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5143 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5143" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5144 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5144" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6362-1 vom 2023-09-12", "url": "https://ubuntu.com/security/notices/USN-6362-1" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-09-12", "url": "https://msrc.microsoft.com/update-guide" } ], "source_lang": "en-US", "title": "Microsoft Developer Tools: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-21T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:58:21.710+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2333", "initial_release_date": "2023-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-09-13T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-14T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-11-02T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2023-11-06T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "7", "summary": "PoC aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Microsoft .NET Framework 4.8.1", "product": { "name": "Microsoft .NET Framework 4.8.1", "product_id": "1273212", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.8.1" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 3.5.1", "product": { "name": "Microsoft .NET Framework 3.5.1", "product_id": "130815", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:3.5.1" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.6.2", "product": { "name": "Microsoft .NET Framework 4.6.2", "product_id": "336763", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.6.2" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.7", "product": { "name": "Microsoft .NET Framework 4.7", "product_id": "432554", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.7" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.7.1", "product": { "name": "Microsoft .NET Framework 4.7.1", "product_id": "432555", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.7.1" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.7.2", "product": { "name": "Microsoft .NET Framework 4.7.2", "product_id": "432556", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.7.2" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.8", "product": { "name": "Microsoft .NET Framework 4.8", "product_id": "432557", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.8" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 3.5", "product": { "name": "Microsoft .NET Framework 3.5", "product_id": "834793", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:3.5:-" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 2.0 SP2", "product": { "name": "Microsoft .NET Framework 2.0 SP2", "product_id": "T021515", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:2.0_sp2" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 3.0 SP2", "product": { "name": "Microsoft .NET Framework 3.0 SP2", "product_id": "T024564", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:3.0_sp2" } } } ], "category": "product_name", "name": ".NET Framework" }, { "branches": [ { "category": "product_name", "name": "Microsoft Azure DevOps Server 2019.0.1", "product": { "name": "Microsoft Azure DevOps Server 2019.0.1", "product_id": "766289", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2019.0.1:-" } } }, { "category": "product_name", "name": "Microsoft Azure DevOps Server 2019.1.2", "product": { "name": "Microsoft Azure DevOps Server 2019.1.2", "product_id": "T029128", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2019.1.2" } } }, { "category": "product_name", "name": "Microsoft Azure DevOps Server 2020.1.2", "product": { "name": "Microsoft Azure DevOps Server 2020.1.2", "product_id": "T029129", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2020.1.2" } } }, { "category": "product_name", "name": "Microsoft Azure DevOps Server 2020.0.2", "product": { "name": "Microsoft Azure DevOps Server 2020.0.2", "product_id": "T029804", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2020.0.2" } } } ], "category": "product_name", "name": "Azure DevOps Server" }, { "category": "product_name", "name": "Microsoft Visual Studio 2017 version 15.9", "product": { "name": "Microsoft Visual Studio 2017 version 15.9", "product_id": "T015502", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2017:version_15.9" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2019 version 16.11", "product": { "name": "Microsoft Visual Studio 2019 version 16.11", "product_id": "T024563", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2019:version_16.11" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.2", "product": { "name": "Microsoft Visual Studio 2022 version 17.2", "product_id": "T028102", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.2" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.4", "product": { "name": "Microsoft Visual Studio 2022 version 17.4", "product_id": "T028103", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.4" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.6", "product": { "name": "Microsoft Visual Studio 2022 version 17.6", "product_id": "T028105", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.6" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.7", "product": { "name": "Microsoft Visual Studio 2022 version 17.7", "product_id": "T029805", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.7" } } } ], "category": "product_name", "name": "Visual Studio 2022" }, { "category": "product_name", "name": "Microsoft Visual Studio Code", "product": { "name": "Microsoft Visual Studio Code", "product_id": "699261", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_code:-" } } } ], "category": "vendor", "name": "Microsoft" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-39956", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-39956" }, { "cve": "CVE-2023-38155", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-38155" }, { "cve": "CVE-2023-36799", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36799" }, { "cve": "CVE-2023-36796", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36796" }, { "cve": "CVE-2023-36794", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36794" }, { "cve": "CVE-2023-36793", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36793" }, { "cve": "CVE-2023-36792", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36792" }, { "cve": "CVE-2023-36788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36788" }, { "cve": "CVE-2023-36759", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36759" }, { "cve": "CVE-2023-36758", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36758" }, { "cve": "CVE-2023-36742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36742" }, { "cve": "CVE-2023-33136", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-33136" } ] }
WID-SEC-W-2023-2333
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Microsoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausf\u00fchrung von Softwareanwendungen und Webdiensten erm\u00f6glicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. f\u00fcr die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.\r\nMicrosoft Azure DevOps Server ist eine Plattform f\u00fcr kollaborative Softwareprojekte.\r\nMicrosoft Visual Studio ist eine integrierte Entwicklungsumgebung f\u00fcr Hochsprachen.\r\nVisual Studio Code ist ein Quelltext-Editor von Microsoft.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in verschiedenen Microsoft Developer Tools ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2333 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2333.json" }, { "category": "self", "summary": "WID-SEC-2023-2333 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2333" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6245 vom 2023-11-06", "url": "http://linux.oracle.com/errata/ELSA-2023-6245.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6242 vom 2023-11-03", "url": "https://linux.oracle.com/errata/ELSA-2023-6242.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6246 vom 2023-11-02", "url": "https://access.redhat.com/errata/RHSA-2023:6246" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6247 vom 2023-11-02", "url": "https://linux.oracle.com/errata/ELSA-2023-6247.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6246 vom 2023-11-03", "url": "https://linux.oracle.com/errata/ELSA-2023-6246.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6362-2 vom 2023-10-25", "url": "https://www.cybersecurity-help.cz/vdb/SB2023102524" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6438-2 vom 2023-10-25", "url": "https://ubuntu.com/security/notices/USN-6438-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5143 vom 2023-09-14", "url": "https://linux.oracle.com/errata/ELSA-2023-5143.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5144 vom 2023-09-14", "url": "https://linux.oracle.com/errata/ELSA-2023-5144.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14", "url": "https://linux.oracle.com/errata/ELSA-2023-5145.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5146 vom 2023-09-14", "url": "http://linux.oracle.com/errata/ELSA-2023-5146.html" }, { "category": "external", "summary": "PoC Exploit vom 2023-11-06", "url": "https://securityonline.info/poc-exploit-published-for-visual-studio-code-rce-vulnerability-cve-2023-36742/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14", "url": "http://linux.oracle.com/errata/ELSA-2023-5145.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5146 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5145 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5145" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5142 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5142" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5143 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5143" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5144 vom 2023-09-13", "url": "https://access.redhat.com/errata/RHSA-2023:5144" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6362-1 vom 2023-09-12", "url": "https://ubuntu.com/security/notices/USN-6362-1" }, { "category": "external", "summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-09-12", "url": "https://msrc.microsoft.com/update-guide" } ], "source_lang": "en-US", "title": "Microsoft Developer Tools: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-21T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:58:21.710+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2333", "initial_release_date": "2023-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-09-13T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-09-14T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-10-24T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-11-02T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2023-11-06T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "7", "summary": "PoC aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Microsoft .NET Framework 4.8.1", "product": { "name": "Microsoft .NET Framework 4.8.1", "product_id": "1273212", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.8.1" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 3.5.1", "product": { "name": "Microsoft .NET Framework 3.5.1", "product_id": "130815", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:3.5.1" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.6.2", "product": { "name": "Microsoft .NET Framework 4.6.2", "product_id": "336763", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.6.2" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.7", "product": { "name": "Microsoft .NET Framework 4.7", "product_id": "432554", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.7" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.7.1", "product": { "name": "Microsoft .NET Framework 4.7.1", "product_id": "432555", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.7.1" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.7.2", "product": { "name": "Microsoft .NET Framework 4.7.2", "product_id": "432556", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.7.2" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 4.8", "product": { "name": "Microsoft .NET Framework 4.8", "product_id": "432557", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:4.8" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 3.5", "product": { "name": "Microsoft .NET Framework 3.5", "product_id": "834793", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:3.5:-" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 2.0 SP2", "product": { "name": "Microsoft .NET Framework 2.0 SP2", "product_id": "T021515", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:2.0_sp2" } } }, { "category": "product_name", "name": "Microsoft .NET Framework 3.0 SP2", "product": { "name": "Microsoft .NET Framework 3.0 SP2", "product_id": "T024564", "product_identification_helper": { "cpe": "cpe:/a:microsoft:.net_framework:3.0_sp2" } } } ], "category": "product_name", "name": ".NET Framework" }, { "branches": [ { "category": "product_name", "name": "Microsoft Azure DevOps Server 2019.0.1", "product": { "name": "Microsoft Azure DevOps Server 2019.0.1", "product_id": "766289", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2019.0.1:-" } } }, { "category": "product_name", "name": "Microsoft Azure DevOps Server 2019.1.2", "product": { "name": "Microsoft Azure DevOps Server 2019.1.2", "product_id": "T029128", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2019.1.2" } } }, { "category": "product_name", "name": "Microsoft Azure DevOps Server 2020.1.2", "product": { "name": "Microsoft Azure DevOps Server 2020.1.2", "product_id": "T029129", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2020.1.2" } } }, { "category": "product_name", "name": "Microsoft Azure DevOps Server 2020.0.2", "product": { "name": "Microsoft Azure DevOps Server 2020.0.2", "product_id": "T029804", "product_identification_helper": { "cpe": "cpe:/o:microsoft:azure_devops_server:2020.0.2" } } } ], "category": "product_name", "name": "Azure DevOps Server" }, { "category": "product_name", "name": "Microsoft Visual Studio 2017 version 15.9", "product": { "name": "Microsoft Visual Studio 2017 version 15.9", "product_id": "T015502", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2017:version_15.9" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2019 version 16.11", "product": { "name": "Microsoft Visual Studio 2019 version 16.11", "product_id": "T024563", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2019:version_16.11" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.2", "product": { "name": "Microsoft Visual Studio 2022 version 17.2", "product_id": "T028102", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.2" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.4", "product": { "name": "Microsoft Visual Studio 2022 version 17.4", "product_id": "T028103", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.4" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.6", "product": { "name": "Microsoft Visual Studio 2022 version 17.6", "product_id": "T028105", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.6" } } }, { "category": "product_name", "name": "Microsoft Visual Studio 2022 version 17.7", "product": { "name": "Microsoft Visual Studio 2022 version 17.7", "product_id": "T029805", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.7" } } } ], "category": "product_name", "name": "Visual Studio 2022" }, { "category": "product_name", "name": "Microsoft Visual Studio Code", "product": { "name": "Microsoft Visual Studio Code", "product_id": "699261", "product_identification_helper": { "cpe": "cpe:/a:microsoft:visual_studio_code:-" } } } ], "category": "vendor", "name": "Microsoft" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-39956", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-39956" }, { "cve": "CVE-2023-38155", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-38155" }, { "cve": "CVE-2023-36799", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36799" }, { "cve": "CVE-2023-36796", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36796" }, { "cve": "CVE-2023-36794", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36794" }, { "cve": "CVE-2023-36793", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36793" }, { "cve": "CVE-2023-36792", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36792" }, { "cve": "CVE-2023-36788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36788" }, { "cve": "CVE-2023-36759", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36759" }, { "cve": "CVE-2023-36758", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36758" }, { "cve": "CVE-2023-36742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-36742" }, { "cve": "CVE-2023-33136", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "432555", "432556", "432554", "67646", "432557", "T015502", "130815", "T004914", "834793", "766289", "336763", "699261", "1273212", "T021515", "T029805", "T000126", "T029804", "T024564", "T024563", "T028105", "T029129", "T029128", "T028103", "T028102" ] }, "release_date": "2023-09-12T22:00:00.000+00:00", "title": "CVE-2023-33136" } ] }
fkie_cve-2023-36759
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
microsoft | visual_studio_2019 | * | |
microsoft | visual_studio_2022 | * | |
microsoft | visual_studio_2022 | * | |
microsoft | visual_studio_2022 | * | |
microsoft | visual_studio_2022 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "matchCriteriaId": "40434953-906B-453E-9F4C-46BF0F693E06", "versionEndExcluding": "16.11.30", "versionStartIncluding": "16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "37E17676-8AD6-4FB1-8983-EB1CD4B888EF", "versionEndExcluding": "17.2.19", "versionStartIncluding": "17.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "B49C4225-E3D7-4FEF-AAB5-5866C897B6F1", "versionEndExcluding": "17.4.11", "versionStartIncluding": "17.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8C5B89F-287F-43BA-99B3-85B475B53CE2", "versionEndExcluding": "17.6.7", "versionStartIncluding": "17.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", "matchCriteriaId": "F041DA8F-B61D-4AF5-9248-22D68F38E74F", "versionEndExcluding": "17.7.4", "versionStartIncluding": "17.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Visual Studio Elevation of Privilege Vulnerability" }, { "lang": "es", "value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios en Visual Studio" } ], "id": "CVE-2023-36759", "lastModified": "2024-11-21T08:10:32.297", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Primary" } ] }, "published": "2023-09-12T17:15:11.513", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-822" } ], "source": "secure@microsoft.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-724g-5w99-h7cw
Vulnerability from github
Visual Studio Elevation of Privilege Vulnerability
{ "affected": [], "aliases": [ "CVE-2023-36759" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-09-12T17:15:11Z", "severity": "MODERATE" }, "details": "Visual Studio Elevation of Privilege Vulnerability", "id": "GHSA-724g-5w99-h7cw", "modified": "2024-04-04T07:37:31Z", "published": "2023-09-12T18:30:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36759" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.