Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-29363

Опубликовано: 12 дек. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

Отчет

The p11-kit library is primarily intended to be used locally, in which case the attacker needs to have sufficient permission to access the p11-kit communication. Although there may be use cases of p11-kit being used with a remote entity, all parties must be considered trusted. As a result, Red Hat considers this vulnerability with a Medium severity.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6p11-kitNot affected
Red Hat Enterprise Linux 7p11-kitNot affected
Red Hat Enterprise Linux 8p11-kitFixedRHSA-2021:160918.05.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1903588p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c

EPSS

Процентиль: 68%
0.00575
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

CVSS3: 7.5
nvd
почти 5 лет назад

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

CVSS3: 7.5
msrc
почти 5 лет назад

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

CVSS3: 7.5
debian
почти 5 лет назад

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-base ...

CVSS3: 7.5
fstec
около 5 лет назад

Уязвимость функции p11_rpc_buffer_get_byte_array_value библиотеки для работы с модулями PKCS P11-kit, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 68%
0.00575
Низкий

7.5 High

CVSS3