CVE-2022-42010
CVSS V2 None
CVSS V3 Medium 6.5
Description
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
Overview
- CVE ID
- CVE-2022-42010
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2022-10-10T00:15:09
- Last Modified Date
- 2023-01-18T21:20:10
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:* | 1 | OR | 1.12.0 | 1.12.24 |
cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:* | 1 | OR | 1.13.0 | 1.14.4 |
cpe:2.3:a:d-bus_project:d-bus:*:*:*:*:*:*:*:* | 1 | OR | 1.15.0 | 1.15.2 |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 6.5
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://gitlab.freedesktop.org/dbus/dbus/-/issues/418 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/ | Mailing List Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/10/06/1 | Mailing List Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-42010 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-10-10 01:00:10 | Added to TrackCVE | |||
2022-12-07 05:55:05 | 2022-10-10T00:15Z | 2022-10-10T00:15:09 | CVE Published Date | updated |
2022-12-07 05:55:05 | 2022-11-14T15:16:18 | CVE Modified Date | updated | |
2022-12-07 05:55:05 | Undergoing Analysis | Vulnerability Status | updated | |
2022-12-07 05:55:13 | References | updated | ||
2022-12-08 23:15:51 | 2022-12-08T22:41:02 | CVE Modified Date | updated | |
2022-12-08 23:15:51 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-18 21:13:07 | Analyzed | Undergoing Analysis | Vulnerability Status | updated |
2023-01-18 22:13:55 | 2023-01-18T21:20:10 | CVE Modified Date | updated | |
2023-01-18 22:13:55 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |