Vulnerabilites related to Fedora - Extra Packages for Enterprise Linux 7
cve-2023-25585
Vulnerability from cvelistv5
Published
2023-09-14 20:50
Modified
2025-02-13 16:44
Summary
A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.
Impacted products
Vendor Product Version
n/a binutils
   Red Hat Red Hat Enterprise Linux 6     cpe:/o:redhat:enterprise_linux:6
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 7     cpe:/o:redhat:enterprise_linux:7
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 7 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:25:19.297Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-25585",
               },
               {
                  name: "RHBZ#2167498",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167498",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/bugzilla/show_bug.cgi?id=29892",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231103-0003/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-25585",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-25T18:20:22.619522Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-25T18:20:31.908Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "binutils",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "gcc-toolset-11-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 7",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 36",
               vendor: "Fedora",
            },
         ],
         datePublic: "2022-12-12T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-457",
                     description: "Use of Uninitialized Variable",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-04T05:07:10.765Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-25585",
            },
            {
               name: "RHBZ#2167498",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167498",
            },
            {
               url: "https://sourceware.org/bugzilla/show_bug.cgi?id=29892",
            },
            {
               url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231103-0003/",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-01-12T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2022-12-12T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Field `file_table` of `struct module *module` is uninitialized",
         x_redhatCweChain: "CWE-457: Use of Uninitialized Variable",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-25585",
      datePublished: "2023-09-14T20:50:09.526Z",
      dateReserved: "2023-02-07T19:03:20.221Z",
      dateUpdated: "2025-02-13T16:44:32.455Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5546
Vulnerability from cvelistv5
Published
2023-11-09 19:34
Modified
2024-08-02 07:59
Summary
ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:moodle:moodle:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moodle",
                  vendor: "moodle",
                  versions: [
                     {
                        lessThan: "4.2.3",
                        status: "affected",
                        version: "4.2.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.1.6",
                        status: "affected",
                        version: "4.1.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.0.11",
                        status: "affected",
                        version: "4.0.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5546",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T19:14:29.937450Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:28:29.756Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.768Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78971",
               },
               {
                  name: "RHBZ#2243445",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243445",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451587",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:48:24.427Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78971",
            },
            {
               name: "RHBZ#2243445",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243445",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451587",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: stored xss in quiz grading report via user id number",
         x_redhatCweChain: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5546",
      datePublished: "2023-11-09T19:34:21.895Z",
      dateReserved: "2023-10-12T00:26:38.202Z",
      dateUpdated: "2024-08-02T07:59:44.768Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5544
Vulnerability from cvelistv5
Published
2023-11-09 19:32
Modified
2024-08-02 07:59
Summary
Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.772Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509",
               },
               {
                  name: "RHBZ#2243443",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243443",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451585",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:35.142Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509",
            },
            {
               name: "RHBZ#2243443",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243443",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451585",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: stored xss and potential idor risk in wiki comments",
         x_redhatCweChain: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5544",
      datePublished: "2023-11-09T19:32:16.862Z",
      dateReserved: "2023-10-12T00:14:41.896Z",
      dateUpdated: "2024-08-02T07:59:44.772Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5540
Vulnerability from cvelistv5
Published
2023-11-09 19:15
Modified
2024-08-02 07:59
Summary
A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5540",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T20:12:01.101624Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:28:35.961Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.894Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409",
               },
               {
                  name: "RHBZ#2243432",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243432",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451581",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-94",
                     description: "Improper Control of Generation of Code ('Code Injection')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:11.209Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409",
            },
            {
               name: "RHBZ#2243432",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243432",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451581",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: authenticated remote code execution risk in imscp",
         x_redhatCweChain: "CWE-94: Improper Control of Generation of Code ('Code Injection')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5540",
      datePublished: "2023-11-09T19:15:53.821Z",
      dateReserved: "2023-10-11T23:39:10.773Z",
      dateUpdated: "2024-08-02T07:59:44.894Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-3603
Vulnerability from cvelistv5
Published
2023-07-21 19:09
Modified
2024-09-26 20:04
Summary
A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users. Given this code is not in any released versions, no security releases have been issued.
References
https://access.redhat.com/security/cve/CVE-2023-3603vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2221791issue-tracking, x_refsource_REDHAT
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:01:56.718Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-3603",
               },
               {
                  name: "RHBZ#2221791",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2221791",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-3603",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-26T20:04:28.247195Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-26T20:04:43.251Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "libssh",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unaffected",
               packageName: "libssh",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "libssh",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "libssh",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "libssh",
               product: "Extra Packages for Enterprise Linux 7",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "libssh",
               product: "Fedora",
               vendor: "Fedora",
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Upstream acknowledges Wei Chong Tan as the original reporter.",
            },
         ],
         datePublic: "2023-07-10T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A missing allocation check in sftp server processing read requests may cause a NULL dereference on low-memory conditions. The malicious client can request up to 4GB SFTP reads, causing allocation of up to 4GB buffers, which was not being checked for failure. This will likely crash the authenticated user's sftp server connection (if implemented as forking as recommended). For thread-based servers, this might also cause DoS for legitimate users.\r\n\r\nGiven this code is not in any released versions, no security releases have been issued.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-23T00:58:36.996Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-3603",
            },
            {
               name: "RHBZ#2221791",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2221791",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-07-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-07-10T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Processing sftp server read may cause null dereference",
         workarounds: [
            {
               lang: "en",
               value: "The SFTP server implementation is based on callbacks so you can rewrite the sftp_channel_default_data_callback() to provide additional checks.\n\n[1] https://gitlab.com/libssh/libssh-mirror/-/blob/master/examples/sample_sftpserver.c#L330",
            },
         ],
         x_redhatCweChain: "CWE-476: NULL Pointer Dereference",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-3603",
      datePublished: "2023-07-21T19:09:44.083Z",
      dateReserved: "2023-07-10T18:21:21.431Z",
      dateUpdated: "2024-09-26T20:04:43.251Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5543
Vulnerability from cvelistv5
Published
2023-11-09 21:35
Modified
2024-08-02 07:59
Summary
When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5543",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-16T21:03:37.918205Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-16T21:03:45.184Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.863Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795",
               },
               {
                  name: "RHBZ#2243442",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243442",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451584",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:25.315Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795",
            },
            {
               name: "RHBZ#2243442",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243442",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451584",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: duplicating a bigbluebutton activity assigns the same meeting id",
         x_redhatCweChain: "CWE-284: Improper Access Control",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5543",
      datePublished: "2023-11-09T21:35:38.116Z",
      dateReserved: "2023-10-12T00:08:16.985Z",
      dateUpdated: "2024-08-02T07:59:44.863Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5548
Vulnerability from cvelistv5
Published
2023-11-09 19:36
Modified
2024-08-02 07:59
Summary
Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.808Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846",
               },
               {
                  name: "RHBZ#2243449",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243449",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451589",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-349",
                     description: "Acceptance of Extraneous Untrusted Data With Trusted Data",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:48:28.693Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846",
            },
            {
               name: "RHBZ#2243449",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243449",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451589",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: cache poisoning risk with endpoint revision numbers",
         x_redhatCweChain: "CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5548",
      datePublished: "2023-11-09T19:36:18.676Z",
      dateReserved: "2023-10-12T00:42:28.476Z",
      dateUpdated: "2024-08-02T07:59:44.808Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5549
Vulnerability from cvelistv5
Published
2023-11-09 19:37
Modified
2024-08-02 07:59
Summary
Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5549",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-19T18:16:10.000934Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:28:45.229Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.965Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730",
               },
               {
                  name: "RHBZ#2243451",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243451",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451590",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:48:38.114Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730",
            },
            {
               name: "RHBZ#2243451",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243451",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451590",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: insufficient capability checks when updating the parent of a course category",
         x_redhatCweChain: "CWE-284: Improper Access Control",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5549",
      datePublished: "2023-11-09T19:37:15.856Z",
      dateReserved: "2023-10-12T00:45:57.574Z",
      dateUpdated: "2024-08-02T07:59:44.965Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5542
Vulnerability from cvelistv5
Published
2023-11-09 19:27
Modified
2024-08-02 07:59
Summary
Students in "Only see own membership" groups could see other students in the group, which should be hidden.
Impacted products
Vendor Product Version
Version: 4.2.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:moodle:moodle:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moodle",
                  vendor: "moodle",
                  versions: [
                     {
                        status: "affected",
                        version: "4.2.2",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5542",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-21T17:05:11.480942Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:28:41.427Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.790Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213",
               },
               {
                  name: "RHBZ#2243441",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243441",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451583",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     status: "affected",
                     version: "4.2.2",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "Students in \"Only see own membership\" groups could see other students in the group, which should be hidden.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:21.258Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213",
            },
            {
               name: "RHBZ#2243441",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243441",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451583",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: students can view other users in \"only see own membership\" groups",
         x_redhatCweChain: "CWE-284: Improper Access Control",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5542",
      datePublished: "2023-11-09T19:27:38.733Z",
      dateReserved: "2023-10-12T00:01:12.085Z",
      dateUpdated: "2024-08-02T07:59:44.790Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5551
Vulnerability from cvelistv5
Published
2023-11-09 19:39
Modified
2024-09-04 13:24
Summary
Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.859Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310",
               },
               {
                  name: "RHBZ#2243453",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243453",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451592",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5551",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-04T13:23:28.368236Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-04T13:24:24.392Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:48:56.245Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310",
            },
            {
               name: "RHBZ#2243453",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243453",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451592",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: forum summary report shows students from other groups when in separate groups mode",
         x_redhatCweChain: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5551",
      datePublished: "2023-11-09T19:39:11.940Z",
      dateReserved: "2023-10-12T00:54:22.507Z",
      dateUpdated: "2024-09-04T13:24:24.392Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5539
Vulnerability from cvelistv5
Published
2023-11-09 19:11
Modified
2024-09-03 18:29
Summary
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.757Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408",
               },
               {
                  name: "RHBZ#2243352",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243352",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451580",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moodle",
                  vendor: "moodle",
                  versions: [
                     {
                        lessThan: "4.2.3",
                        status: "affected",
                        version: "4.2.0",
                        versionType: "semver",
                     },
                     {
                        lessThan: "4.1.6",
                        status: "affected",
                        version: "4.1.0",
                        versionType: "semver",
                     },
                     {
                        lessThan: "4.0.11",
                        status: "affected",
                        version: "4.0.0",
                        versionType: "semver",
                     },
                     {
                        lessThan: "3.11.17",
                        status: "affected",
                        version: "3.11.0",
                        versionType: "semver",
                     },
                     {
                        lessThan: "3.9.24",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5539",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-03T18:23:49.115260Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-03T18:29:00.544Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T04:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-94",
                     description: "Improper Control of Generation of Code ('Code Injection')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:09.393Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408",
            },
            {
               name: "RHBZ#2243352",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243352",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451580",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T04:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: authenticated remote code execution risk in lesson",
         x_redhatCweChain: "CWE-94: Improper Control of Generation of Code ('Code Injection')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5539",
      datePublished: "2023-11-09T19:11:06.859Z",
      dateReserved: "2023-10-11T23:11:25.576Z",
      dateUpdated: "2024-09-03T18:29:00.544Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5547
Vulnerability from cvelistv5
Published
2023-11-09 19:35
Modified
2024-09-04 13:25
Summary
The course upload preview contained an XSS risk for users uploading unsafe data.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.812Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455",
               },
               {
                  name: "RHBZ#2243447",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243447",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451588",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5547",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-04T13:25:11.137670Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-04T13:25:23.138Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "The course upload preview contained an XSS risk for users uploading unsafe data.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:48:26.816Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455",
            },
            {
               name: "RHBZ#2243447",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243447",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451588",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: xss risk when previewing data in course upload tool",
         x_redhatCweChain: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5547",
      datePublished: "2023-11-09T19:35:24.575Z",
      dateReserved: "2023-10-12T00:30:28.296Z",
      dateUpdated: "2024-09-04T13:25:23.138Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5550
Vulnerability from cvelistv5
Published
2023-11-09 19:38
Modified
2024-08-02 07:59
Summary
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moodle",
                  vendor: "moodle",
                  versions: [
                     {
                        lessThan: "4.2.3",
                        status: "affected",
                        version: "4.2.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.1.6",
                        status: "affected",
                        version: "4.1.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.0.11",
                        status: "affected",
                        version: "4.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "3.11.17",
                        status: "affected",
                        version: "3.11.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "3.9.24",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5550",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-27T19:58:39.374445Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-27T20:20:34.381Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.743Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249",
               },
               {
                  name: "RHBZ#2243452",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243452",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451591",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-94",
                     description: "Improper Control of Generation of Code ('Code Injection')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:48:40.047Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249",
            },
            {
               name: "RHBZ#2243452",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243452",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451591",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: rce due to lfi risk in some misconfigured shared hosting environments",
         x_redhatCweChain: "CWE-94: Improper Control of Generation of Code ('Code Injection')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5550",
      datePublished: "2023-11-09T19:38:08.611Z",
      dateReserved: "2023-10-12T00:50:39.990Z",
      dateUpdated: "2024-08-02T07:59:44.743Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5541
Vulnerability from cvelistv5
Published
2023-11-09 19:18
Modified
2024-08-02 07:59
Summary
The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5541",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-17T20:18:35.680052Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-17T20:18:45.855Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.802Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79426",
               },
               {
                  name: "RHBZ#2243437",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243437",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451582",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:12.382Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79426",
            },
            {
               name: "RHBZ#2243437",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243437",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451582",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: xss risk when using csv grade import method",
         x_redhatCweChain: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5541",
      datePublished: "2023-11-09T19:18:22.119Z",
      dateReserved: "2023-10-11T23:48:36.508Z",
      dateUpdated: "2024-08-02T07:59:44.802Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-5545
Vulnerability from cvelistv5
Published
2023-11-09 19:33
Modified
2024-08-02 07:59
Summary
H5P metadata automatically populated the author with the user's username, which could be sensitive information.
Impacted products
Vendor Product Version
Version: 4.2.0   
Version: 4.1.0   
Version: 4.0.0   
Version: 3.11.0   
Version: 0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:moodle:h5p:4.1:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "h5p",
                  vendor: "moodle",
                  versions: [
                     {
                        status: "affected",
                        version: "4.1",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:moodle:h5p:4.2:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "h5p",
                  vendor: "moodle",
                  versions: [
                     {
                        status: "affected",
                        version: "4.2",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:moodle:h5p:4.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "h5p",
                  vendor: "moodle",
                  versions: [
                     {
                        status: "affected",
                        version: "4.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:moodle:h5p:3.11:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "h5p",
                  vendor: "moodle",
                  versions: [
                     {
                        status: "affected",
                        version: "3.11",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:moodle:h5p:3.9:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "h5p",
                  vendor: "moodle",
                  versions: [
                     {
                        status: "affected",
                        version: "3.9",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-5545",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-22T19:58:29.250008Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        description: "Exposure of Sensitive Information to an Unauthorized Actor",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
               {
                  descriptions: [
                     {
                        cweId: "CWE-200",
                        description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:28:46.075Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T07:59:44.795Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820",
               },
               {
                  name: "RHBZ#2243444",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243444",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://moodle.org/mod/forum/discuss.php?d=451586",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://git.moodle.org",
               defaultStatus: "unaffected",
               packageName: "moodle",
               versions: [
                  {
                     lessThan: "4.2.3",
                     status: "affected",
                     version: "4.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.1.6",
                     status: "affected",
                     version: "4.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "4.0.11",
                     status: "affected",
                     version: "4.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.11.17",
                     status: "affected",
                     version: "3.11.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.9.24",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "H5P metadata automatically populated the author with the user's username, which could be sensitive information.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "Exposure of Sensitive Information to an Unauthorized Actor",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-04-19T13:47:42.679Z",
            orgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
            shortName: "fedora",
         },
         references: [
            {
               url: "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820",
            },
            {
               name: "RHBZ#2243444",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2243444",
            },
            {
               url: "https://moodle.org/mod/forum/discuss.php?d=451586",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-10-10T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-10-16T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Moodle: auto-populated h5p author name causes a potential information leak",
         x_redhatCweChain: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
      },
   },
   cveMetadata: {
      assignerOrgId: "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
      assignerShortName: "fedora",
      cveId: "CVE-2023-5545",
      datePublished: "2023-11-09T19:33:18.127Z",
      dateReserved: "2023-10-12T00:18:04.007Z",
      dateUpdated: "2024-08-02T07:59:44.795Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-25584
Vulnerability from cvelistv5
Published
2023-09-14 20:50
Modified
2025-02-13 16:44
Summary
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
Impacted products
Vendor Product Version
n/a binutils
   Red Hat Red Hat Enterprise Linux 6     cpe:/o:redhat:enterprise_linux:6
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 7     cpe:/o:redhat:enterprise_linux:7
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 7 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:25:19.308Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-25584",
               },
               {
                  name: "RHBZ#2167467",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167467",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231103-0002/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-25584",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-23T19:33:44.565202Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-03T14:47:06.335Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "binutils",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "gcc-toolset-11-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-11-gdb",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-gdb",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-gdb",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 7",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 37",
               vendor: "Fedora",
            },
         ],
         datePublic: "2022-12-12T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-04T05:07:06.103Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-25584",
            },
            {
               name: "RHBZ#2167467",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167467",
            },
            {
               url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231103-0002/",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-01-12T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2022-12-12T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Out of bounds read in parse_module function in bfd/vms-alpha.c",
         x_redhatCweChain: "CWE-125: Out-of-bounds Read",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-25584",
      datePublished: "2023-09-14T20:50:58.267Z",
      dateReserved: "2023-02-07T19:03:20.220Z",
      dateUpdated: "2025-02-13T16:44:31.939Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-25586
Vulnerability from cvelistv5
Published
2023-09-14 20:49
Modified
2025-02-13 16:44
Summary
A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.
Impacted products
Vendor Product Version
n/a binutils
   Red Hat Red Hat Enterprise Linux 6     cpe:/o:redhat:enterprise_linux:6
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 7     cpe:/o:redhat:enterprise_linux:7
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 7     cpe:/o:redhat:enterprise_linux:7
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 7 Create a notification for this product.
   Fedora Fedora Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:25:19.230Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-25586",
               },
               {
                  name: "RHBZ#2167502",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167502",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/bugzilla/show_bug.cgi?id=29855",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231103-0003/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-25586",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-25T18:21:11.697914Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-25T18:21:19.562Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "binutils",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unaffected",
               packageName: "gdb",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-11-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-11-gdb",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-gdb",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "unaffected",
               packageName: "gdb",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-gdb",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gdb",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "gdb",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 7",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Fedora 36",
               vendor: "Fedora",
            },
         ],
         datePublic: "2022-12-12T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-457",
                     description: "Use of Uninitialized Variable",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-04T05:07:13.976Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-25586",
            },
            {
               name: "RHBZ#2167502",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167502",
            },
            {
               url: "https://sourceware.org/bugzilla/show_bug.cgi?id=29855",
            },
            {
               url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231103-0003/",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-01-12T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2022-12-12T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized",
         x_redhatCweChain: "CWE-457: Use of Uninitialized Variable",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-25586",
      datePublished: "2023-09-14T20:49:15.468Z",
      dateReserved: "2023-02-07T19:03:20.221Z",
      dateUpdated: "2025-02-13T16:44:33.064Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-25588
Vulnerability from cvelistv5
Published
2023-09-14 20:47
Modified
2025-02-13 16:44
Summary
A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.
Impacted products
Vendor Product Version
n/a binutils
   Red Hat Red Hat Enterprise Linux 6     cpe:/o:redhat:enterprise_linux:6
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 7     cpe:/o:redhat:enterprise_linux:7
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8     cpe:/o:redhat:enterprise_linux:8
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9     cpe:/o:redhat:enterprise_linux:9
Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 7 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 37 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
   Fedora Extra Packages for Enterprise Linux 8 Create a notification for this product.
   Fedora Fedora 36 Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:25:19.353Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-25588",
               },
               {
                  name: "RHBZ#2167505",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167505",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/bugzilla/show_bug.cgi?id=29677",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20231103-0003/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-25588",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-25T18:22:06.630431Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-25T18:22:15.590Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "binutils",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "gcc-toolset-11-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "unaffected",
               packageName: "gcc-toolset-12-binutils",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Extra Packages for Enterprise Linux 7",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "binutils",
               product: "Fedora",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "radare2",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 37",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "insight",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "mingw-binutils",
               product: "Fedora 36",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Extra Packages for Enterprise Linux 8",
               vendor: "Fedora",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "unaffected",
               packageName: "rizin",
               product: "Fedora 36",
               vendor: "Fedora",
            },
         ],
         datePublic: "2022-12-12T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Low",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-457",
                     description: "Use of Uninitialized Variable",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-04T05:07:12.363Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-25588",
            },
            {
               name: "RHBZ#2167505",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2167505",
            },
            {
               url: "https://sourceware.org/bugzilla/show_bug.cgi?id=29677",
            },
            {
               url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20231103-0003/",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-01-12T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2022-12-12T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`",
         x_redhatCweChain: "CWE-457: Use of Uninitialized Variable",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-25588",
      datePublished: "2023-09-14T20:47:16.974Z",
      dateReserved: "2023-02-07T19:03:20.221Z",
      dateUpdated: "2025-02-13T16:44:33.622Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}