fkie_cve-2024-43167
Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-11-21 09:35
Severity ?
Summary
DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a security risk within Red Hat products. NLnet Labs has no further information about the claim, and suggests that affected Red Hat customers refer to available Red Hat documentation or support channels. ORIGINAL DESCRIPTION: A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.
References
Impacted products
Vendor | Product | Version |
---|
{ cveTags: [], descriptions: [ { lang: "en", value: "DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a security risk within Red Hat products. NLnet Labs has no further information about the claim, and suggests that affected Red Hat customers refer to available Red Hat documentation or support channels. ORIGINAL DESCRIPTION: A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.", }, { lang: "es", value: "Se encontró una falla de desreferencia de puntero NULL en la función ub_ctx_set_fwd en Unbound. Este problema podría permitir que un atacante que pueda invocar secuencias específicas de llamadas API provoque un error de segmentación. Cuando ciertas funciones API como ub_ctx_set_fwd y ub_ctx_resolvconf se llaman en un orden particular, el programa intenta leer desde un puntero NULL, lo que provoca un bloqueo. Este problema puede provocar una denegación de servicio al provocar que la aplicación finalice inesperadamente.", }, ], id: "CVE-2024-43167", lastModified: "2024-11-21T09:35:06.587", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 2.8, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 1.3, impactScore: 1.4, source: "sep@nlnetlabs.nl", type: "Secondary", }, ], }, published: "2024-08-12T13:38:35.927", references: [ { source: "sep@nlnetlabs.nl", url: "https://access.redhat.com/security/cve/CVE-2024-43167", }, { source: "sep@nlnetlabs.nl", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2303456", }, { source: "sep@nlnetlabs.nl", url: "https://github.com/NLnetLabs/unbound/issues/1072", }, { source: "sep@nlnetlabs.nl", url: "https://github.com/NLnetLabs/unbound/pull/1073/files", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2024/08/16/6", }, ], sourceIdentifier: "sep@nlnetlabs.nl", vulnStatus: "Awaiting Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "sep@nlnetlabs.nl", type: "Secondary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.