Vulnerabilites related to Canonical - whoopsie
CVE-2019-11484 (GCVE-0-2019-11484)
Vulnerability from cvelistv5
Published
2020-02-08 04:50
Modified
2024-09-17 01:50
CWE
  • CWE-190 - Integer Overflow or Wraparound
Summary
Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.
Impacted products
Vendor Product Version
Canonical whoopsie Version: 0.2.52.5   < 0.2.52.5ubuntu0.2
Version: 0.2.62   < 0.2.62ubuntu0.2
Version: 0.2.66   < 0.2.66ubuntu0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:55:40.228Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/usn/usn-4170-1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/usn/usn-4170-2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "whoopsie",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "0.2.52.5ubuntu0.2",
              "status": "affected",
              "version": "0.2.52.5",
              "versionType": "custom"
            },
            {
              "lessThan": "0.2.62ubuntu0.2",
              "status": "affected",
              "version": "0.2.62",
              "versionType": "custom"
            },
            {
              "lessThan": "0.2.66ubuntu0.1",
              "status": "affected",
              "version": "0.2.66",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Kevin Backhouse"
        }
      ],
      "datePublic": "2019-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190 Integer Overflow or Wraparound",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-12T00:00:00",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "url": "https://usn.ubuntu.com/usn/usn-4170-1"
        },
        {
          "url": "https://usn.ubuntu.com/usn/usn-4170-2"
        },
        {
          "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html"
        }
      ],
      "source": {
        "advisory": "https://usn.ubuntu.com/4170-1/",
        "defect": [
          "https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1830865"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Integer overflow in bson_ensure_space",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2019-11484",
    "datePublished": "2020-02-08T04:50:23.208886Z",
    "dateReserved": "2019-04-23T00:00:00",
    "dateUpdated": "2024-09-17T01:50:56.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-11937 (GCVE-0-2020-11937)
Vulnerability from cvelistv5
Published
2020-08-06 22:50
Modified
2024-09-17 04:15
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Summary
In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.
References
https://launchpad.net/bugs/1881982 x_refsource_CONFIRM
https://usn.ubuntu.com/4450-1 x_refsource_CONFIRM
https://github.com/sungjungk/whoopsie_killer x_refsource_CONFIRM
https://usn.ubuntu.com/4450-1/ vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
Canonical whoopsie Version: 0.2.52   < 0.2.52.5ubuntu0.5
Version: 0.2.62   < 0.2.62ubuntu0.5
Version: 0.2.69   < 0.2.69ubuntu0.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:42:00.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://launchpad.net/bugs/1881982"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4450-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/sungjungk/whoopsie_killer"
          },
          {
            "name": "USN-4450-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4450-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "whoopsie",
          "vendor": "Canonical",
          "versions": [
            {
              "lessThan": "0.2.52.5ubuntu0.5",
              "status": "affected",
              "version": "0.2.52",
              "versionType": "custom"
            },
            {
              "lessThan": "0.2.62ubuntu0.5",
              "status": "affected",
              "version": "0.2.62",
              "versionType": "custom"
            },
            {
              "lessThan": "0.2.69ubuntu0.1",
              "status": "affected",
              "version": "0.2.69",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Seong-Joong Kim"
        }
      ],
      "datePublic": "2020-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-12T16:06:09",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://launchpad.net/bugs/1881982"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://usn.ubuntu.com/4450-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/sungjungk/whoopsie_killer"
        },
        {
          "name": "USN-4450-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4450-1/"
        }
      ],
      "source": {
        "advisory": "https://usn.ubuntu.com/4450-1",
        "defect": [
          "https://launchpad.net/bugs/1881982"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Resource exhaustion vulnerability in whoopsie",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "",
          "ASSIGNER": "security@ubuntu.com",
          "DATE_PUBLIC": "2020-06-11T05:13:00.000Z",
          "ID": "CVE-2020-11937",
          "STATE": "PUBLIC",
          "TITLE": "Resource exhaustion vulnerability in whoopsie"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "whoopsie",
                      "version": {
                        "version_data": [
                          {
                            "platform": "",
                            "version_affected": "\u003c",
                            "version_name": "0.2.52",
                            "version_value": "0.2.52.5ubuntu0.5"
                          },
                          {
                            "platform": "",
                            "version_affected": "\u003c",
                            "version_name": "0.2.62",
                            "version_value": "0.2.62ubuntu0.5"
                          },
                          {
                            "platform": "",
                            "version_affected": "\u003c",
                            "version_name": "0.2.69",
                            "version_value": "0.2.69ubuntu0.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Canonical"
              }
            ]
          }
        },
        "configuration": [],
        "credit": [
          {
            "lang": "eng",
            "value": "Seong-Joong Kim"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1."
            }
          ]
        },
        "exploit": [],
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400 Uncontrolled Resource Consumption"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://launchpad.net/bugs/1881982",
              "refsource": "CONFIRM",
              "url": "https://launchpad.net/bugs/1881982"
            },
            {
              "name": "https://usn.ubuntu.com/4450-1",
              "refsource": "CONFIRM",
              "url": "https://usn.ubuntu.com/4450-1"
            },
            {
              "name": "https://github.com/sungjungk/whoopsie_killer",
              "refsource": "CONFIRM",
              "url": "https://github.com/sungjungk/whoopsie_killer"
            },
            {
              "name": "USN-4450-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4450-1/"
            }
          ]
        },
        "solution": [],
        "source": {
          "advisory": "https://usn.ubuntu.com/4450-1",
          "defect": [
            "https://launchpad.net/bugs/1881982"
          ],
          "discovery": "EXTERNAL"
        },
        "work_around": []
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2020-11937",
    "datePublished": "2020-08-06T22:50:21.967529Z",
    "dateReserved": "2020-04-20T00:00:00",
    "dateUpdated": "2024-09-17T04:15:20.926Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-08-06 23:15
Modified
2024-11-21 04:58
Summary
In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.
Impacted products
Vendor Product Version
canonical whoopsie 0.2.66
canonical whoopsie 0.2.67
canonical whoopsie 0.2.68
canonical whoopsie 0.2.69
canonical ubuntu_linux 20.04
canonical whoopsie 0.2.49
canonical whoopsie 0.2.50
canonical whoopsie 0.2.51
canonical whoopsie 0.2.52
canonical whoopsie 0.2.52.1
canonical whoopsie 0.2.52.2
canonical whoopsie 0.2.52.3
canonical whoopsie 0.2.52.4
canonical whoopsie 0.2.52.5
canonical whoopsie 0.2.52.5ubuntu0.1
canonical whoopsie 0.2.52.5ubuntu0.2
canonical whoopsie 0.2.52.5ubuntu0.3
canonical whoopsie 0.2.52.5ubuntu0.4
canonical ubuntu_linux 16.04
canonical whoopsie 0.2.58
canonical whoopsie 0.2.59
canonical whoopsie 0.2.59build1
canonical whoopsie 0.2.60
canonical whoopsie 0.2.61
canonical whoopsie 0.2.62
canonical whoopsie 0.2.62ubuntu0.1
canonical whoopsie 0.2.62ubuntu0.2
canonical whoopsie 0.2.62ubuntu0.3
canonical whoopsie 0.2.62ubuntu0.4
canonical ubuntu_linux 18.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "09E0749D-E6A3-435F-858A-A39A240BB4AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "504E16DE-54EC-4433-8375-201C87A0B896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "7275B761-412E-432F-AF71-6629EF7F1F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD90AB7B-09C1-441D-B166-6F2E8CD567AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C35A294-C8B5-4712-9F02-233122304700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "957BB83B-EBFD-4004-A633-93C98B93CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DA392F-66B5-4C4A-A5AB-E0AF952FA1A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC98E67-1E2E-4D98-A1A2-BDAC09D1E165",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEB34AAE-4865-45B1-BC7D-D5BCED403621",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2202D046-99CD-4C16-987A-A7F3C59E9ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AD216EA-F5E6-4710-9B20-F2194B16A1B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F185B9-A9A5-43CF-ABB3-AE0B3C4DE41F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C49AD78B-B66A-461F-B50B-C8CD54B8B21D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.5ubuntu0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F25EE5B-A672-49F2-A01E-19DD64E70DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.5ubuntu0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC8E92D-37E4-460F-A58E-1B8AF9D06720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.5ubuntu0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F8F849C-655F-483B-81EE-9D89AA0B887B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.52.5ubuntu0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DDE289-EAE9-4153-B5D6-54882ACCEC9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "D620E03B-85CD-4FDD-9F66-8B1A15E04128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "22CAD71F-EC0F-4D3F-BC3B-354FF80982A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.59build1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4F973C2-3645-4AF5-B220-E0D913586740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F7176C9-744F-4D1E-8DFB-358F72F170DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0C07D9-5A53-4385-A018-42116C44614B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D98EFFD-CD23-485C-B153-25A3CE784D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.62ubuntu0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AE4686-F26C-4E0E-9528-8A65105F1D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.62ubuntu0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D403650-F9AE-466C-B344-43CC88397DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.62ubuntu0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6CD4D53-D541-4ACD-939D-90926AED1A75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:canonical:whoopsie:0.2.62ubuntu0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1671DFB-F35F-41A9-A634-D90661D31FC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1."
    },
    {
      "lang": "es",
      "value": "En whoopsie, la funci\u00f3n parse_report() del archivo whoopsie.c, permite a un atacante local causar una denegaci\u00f3n de servicio por medio de un archivo dise\u00f1ado. La DoS es causada por el agotamiento de los recursos debido a una p\u00e9rdida de memoria. Corregido en las versiones 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 y 0.2.69ubuntu0.1"
    }
  ],
  "id": "CVE-2020-11937",
  "lastModified": "2024-11-21T04:58:56.357",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "security@ubuntu.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-06T23:15:11.437",
  "references": [
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sungjungk/whoopsie_killer"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://launchpad.net/bugs/1881982"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://usn.ubuntu.com/4450-1"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4450-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sungjungk/whoopsie_killer"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://launchpad.net/bugs/1881982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://usn.ubuntu.com/4450-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4450-1/"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "security@ubuntu.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-401"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}