Executive Summary

Informations
Name CVE-2023-49275 First vendor Publication 2024-04-19
Vendor Cve Last vendor Modification 2024-04-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49275

Sources (Detail)

https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/...
https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/...
https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2024-04-19 21:27:25
  • First insertion