Описание
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
Ссылки
- ExploitThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 2.7 (включая) до 3.5.0 (включая)
cpe:2.3:a:ossec:ossec:*:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00854
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-416
Связанные уязвимости
CVSS3: 9.8
debian
около 6 лет назад
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for ...
CVSS3: 9.8
github
больше 3 лет назад
In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing queue by ossec-remoted).
EPSS
Процентиль: 75%
0.00854
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-416