CVE-2024-45289 (GCVE-0-2024-45289)

Vulnerability from cvelistv5 – Published: 2024-11-12 15:06 – Updated: 2025-01-10 13:06
VLAI?
Summary
The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname. The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option. Fetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.
CWE
  • CWE-665 - Improper Initialization
Assigner
References
Impacted products
Vendor Product Version
FreeBSD FreeBSD Affected: 14.1-RELEASE , < p6 (release)
Affected: 13.4-RELEASE , < p2 (release)
Affected: 13.3-RELEASE , < p8 (release)
Create a notification for this product.
Credits
Franco Fichtner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "freebsd",
            "vendor": "freebsd",
            "versions": [
              {
                "lessThan": "p6",
                "status": "affected",
                "version": "14.1-release",
                "versionType": "custom"
              },
              {
                "lessThan": "p2",
                "status": "affected",
                "version": "13.4-release",
                "versionType": "custom"
              },
              {
                "lessThan": "p8",
                "status": "affected",
                "version": "13.3-release",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-45289",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-13T14:22:38.085444Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-13T14:26:36.792Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-01-10T13:06:48.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://security.netapp.com/advisory/ntap-20250110-0001/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "modules": [
            "bhyve"
          ],
          "product": "FreeBSD",
          "vendor": "FreeBSD",
          "versions": [
            {
              "lessThan": "p6",
              "status": "affected",
              "version": "14.1-RELEASE",
              "versionType": "release"
            },
            {
              "lessThan": "p2",
              "status": "affected",
              "version": "13.4-RELEASE",
              "versionType": "release"
            },
            {
              "lessThan": "p8",
              "status": "affected",
              "version": "13.3-RELEASE",
              "versionType": "release"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Franco Fichtner"
        }
      ],
      "datePublic": "2024-10-29T21:32:58.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname.  The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\n\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-665",
              "description": "CWE-665 Improper Initialization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-12T15:06:08.435Z",
        "orgId": "63664ac6-956c-4cba-a5d0-f46076e16109",
        "shortName": "freebsd"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc"
        }
      ],
      "title": "Unbounded allocation in ctl(4) CAM Target Layer"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "63664ac6-956c-4cba-a5d0-f46076e16109",
    "assignerShortName": "freebsd",
    "cveId": "CVE-2024-45289",
    "datePublished": "2024-11-12T15:06:08.435Z",
    "dateReserved": "2024-08-26T14:20:00.870Z",
    "dateUpdated": "2025-01-10T13:06:48.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname.  The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\\n\\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.\"}, {\"lang\": \"es\", \"value\": \"La librer\\u00eda fetch(3) utiliza variables de entorno para pasar cierta informaci\\u00f3n, incluida la ruta del archivo de revocaci\\u00f3n. El nombre de la variable de entorno que utiliza fetch(1) para pasar el nombre del archivo a la librer\\u00eda era incorrecto, por lo que, en efecto, se ignoraba la opci\\u00f3n. Fetch seguir\\u00eda conect\\u00e1ndose a un host que presente un certificado incluido en el archivo de revocaci\\u00f3n que se pasa a la opci\\u00f3n --crl.\"}]",
      "id": "CVE-2024-45289",
      "lastModified": "2025-01-10T13:15:09.710",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
      "published": "2024-11-12T15:15:10.070",
      "references": "[{\"url\": \"https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc\", \"source\": \"secteam@freebsd.org\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250110-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secteam@freebsd.org",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"secteam@freebsd.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-665\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-45289\",\"sourceIdentifier\":\"secteam@freebsd.org\",\"published\":\"2024-11-12T15:15:10.070\",\"lastModified\":\"2025-01-10T13:15:09.710\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname.  The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\\n\\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.\"},{\"lang\":\"es\",\"value\":\"La librer\u00eda fetch(3) utiliza variables de entorno para pasar cierta informaci\u00f3n, incluida la ruta del archivo de revocaci\u00f3n. El nombre de la variable de entorno que utiliza fetch(1) para pasar el nombre del archivo a la librer\u00eda era incorrecto, por lo que, en efecto, se ignoraba la opci\u00f3n. Fetch seguir\u00eda conect\u00e1ndose a un host que presente un certificado incluido en el archivo de revocaci\u00f3n que se pasa a la opci\u00f3n --crl.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secteam@freebsd.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-665\"}]}],\"references\":[{\"url\":\"https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc\",\"source\":\"secteam@freebsd.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250110-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250110-0001/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-10T13:06:48.187Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45289\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-13T14:22:38.085444Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*\"], \"vendor\": \"freebsd\", \"product\": \"freebsd\", \"versions\": [{\"status\": \"affected\", \"version\": \"14.1-release\", \"lessThan\": \"p6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"13.4-release\", \"lessThan\": \"p2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"13.3-release\", \"lessThan\": \"p8\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-13T14:26:28.712Z\"}}], \"cna\": {\"title\": \"Unbounded allocation in ctl(4) CAM Target Layer\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Franco Fichtner\"}], \"affected\": [{\"vendor\": \"FreeBSD\", \"modules\": [\"bhyve\"], \"product\": \"FreeBSD\", \"versions\": [{\"status\": \"affected\", \"version\": \"14.1-RELEASE\", \"lessThan\": \"p6\", \"versionType\": \"release\"}, {\"status\": \"affected\", \"version\": \"13.4-RELEASE\", \"lessThan\": \"p2\", \"versionType\": \"release\"}, {\"status\": \"affected\", \"version\": \"13.3-RELEASE\", \"lessThan\": \"p8\", \"versionType\": \"release\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2024-10-29T21:32:58.000Z\", \"references\": [{\"url\": \"https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname.  The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\\n\\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-665\", \"description\": \"CWE-665 Improper Initialization\"}]}], \"providerMetadata\": {\"orgId\": \"63664ac6-956c-4cba-a5d0-f46076e16109\", \"shortName\": \"freebsd\", \"dateUpdated\": \"2024-11-12T15:06:08.435Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-45289\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-10T13:06:48.187Z\", \"dateReserved\": \"2024-08-26T14:20:00.870Z\", \"assignerOrgId\": \"63664ac6-956c-4cba-a5d0-f46076e16109\", \"datePublished\": \"2024-11-12T15:06:08.435Z\", \"assignerShortName\": \"freebsd\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…