Описание
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
Ссылки
- ExploitPatchThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- ExploitPatchThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 2.7 (включая) до 3.5.0 (включая)
cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00767
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 8.8
debian
почти 6 лет назад
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for ...
CVSS3: 8.8
github
больше 3 лет назад
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
EPSS
Процентиль: 73%
0.00767
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-787