A vulnerability classified as critical was found in Zephyr Project 1.9.0/1.10.0 (Project Management Software). This vulnerability affects the function getaddrinfo()
. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was disclosed 04/12/2019 (GitHub Repository). The advisory is shared for download at github.com. This vulnerability was named CVE-2017-14199 since 09/07/2017. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 04/13/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Product
Name
CPE
CVSSv3
VulDB Meta Base Score: 8.6
VulDB Meta Temp Score: 8.0
VulDB Base Score:
7.3VulDB Temp Score:
6.8VulDB Vector:
🔒VulDB Reliability:
🔍NVD Base Score:
9.8NVD Vector:
🔒CVSSv2
VulDB Base Score:
🔒VulDB Temp Score:
🔒VulDB Reliability:
🔍NVD Base Score:
🔒Exploiting
Class: Memory corruption (
CWE-119)
Local: No
Remote: Yes
Availability:
🔒Status: Not defined
Price Prediction:
🔍Current Price Estimation:
🔒Threat Intelligence
Threat:
🔍Adversaries:
🔍Geopolitics:
🔍Economy:
🔍Predictions:
🔍Remediation:
🔍Countermeasures
Recommended: no mitigation known
0-Day Time:
🔒Timeline
09/07/2017 CVE assigned04/12/2019 Advisory disclosed04/13/2019 VulDB entry created04/13/2019 VulDB last updateSources
Advisory:
github.comStatus: Unconfirmed
CVE:
CVE-2017-14199 (
🔒)
Entry
Created: 04/13/2019 01:37 PM
Complete:
🔍Lien vers l'article source