CVE-2023-49275
CVSS V2 None
CVSS V3 None
Description
Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1.
Overview
- CVE ID
- CVE-2023-49275
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-19T14:24:25.343Z
- Last Modified Date
- 2024-06-04T17:27:54.825Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975 | x_refsource_CONFIRM |
https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573 | x_refsource_MISC |
https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-49275 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49275 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 13:20:03 | Added to TrackCVE |