FKIE_CVE-2020-12647
Vulnerability from fkie_nvd - Published: 2020-05-21 03:15 - Updated: 2024-11-21 04:59
Severity ?
Summary
Unisys ALGOL Compiler 58.1 before 58.1a.15, 59.1 before 59.1a.9, and 60.0 before 60.0a.5 can emit invalid code sequences under rare circumstances related to syntax. The resulting code could, for example, trigger a system fault or adversely affect confidentiality, integrity, and availability.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| unisys | algol_compiler | * | |
| unisys | algol_compiler | * | |
| unisys | algol_compiler | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:unisys:algol_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1138B08-AE17-435E-9CD1-7F9ED07914FB",
"versionEndExcluding": "58.1a.15",
"versionStartIncluding": "58.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unisys:algol_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "654B0A49-8679-427A-B721-81F187FE7020",
"versionEndExcluding": "59.1a.9",
"versionStartIncluding": "59.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:unisys:algol_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30E9F7BE-0A00-49EC-80DF-94D5FAECFCAA",
"versionEndExcluding": "60.0a.5",
"versionStartIncluding": "60.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unisys ALGOL Compiler 58.1 before 58.1a.15, 59.1 before 59.1a.9, and 60.0 before 60.0a.5 can emit invalid code sequences under rare circumstances related to syntax. The resulting code could, for example, trigger a system fault or adversely affect confidentiality, integrity, and availability."
},
{
"lang": "es",
"value": "Unisys ALGOL Compiler versiones 58.1 anteriores a 58.1a.15, versiones 59.1 anteriores a 59.1a.9, y versiones 60.0 anteriores a 60.0a.5, permite a usuarios locales desencadenar un fallo del sistema al ejecutar un c\u00f3digo compilado, o afectar negativamente a la confidencialidad, integridad y disponibilidad, por medio de una sintaxis dise\u00f1ada."
}
],
"id": "CVE-2020-12647",
"lastModified": "2024-11-21T04:59:58.907",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-05-21T03:15:12.853",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=55"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…