Home

2022年10月の脆弱性

誤りがあった場合はTwitterに報告をお願いします。-> Twitter《Har-sia》

今月話題になった脆弱性まとめ

CVE-2022-35737

Description from NVD

SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.

Information Acquisition Date:2022/10/28
CVSS 2.0: 0.0 None CVSS 3.x: 7.5 HIGH
This vulnerability may involve a PoC.

Highest Score:50 (2022/10/26)

脆弱性情報:Har-sia CVE-2022-35737


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-36067

Description from NVD

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

Information Acquisition Date:2022/10/12
CVSS 2.0: 0.0 None CVSS 3.x: 10.0 CRITICAL

Highest Score:39 (2022/10/11)

脆弱性情報:Har-sia CVE-2022-36067


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-3723


Highest Score:54 (2022/10/28)

脆弱性情報:Har-sia CVE-2022-3723


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-37969

Description from NVD

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35803.

Information Acquisition Date:2022/10/30
CVSS 2.0: 0.0 None CVSS 3.x: 7.8 HIGH

Description from Forti

Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability

Information Acquisition Date:2022/10/30

Affected Products

Impact

Recommended Actions

References


Highest Score:92 (2022/09/14)

脆弱性情報:Har-sia CVE-2022-37969


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-40684

Description from NVD

An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

Information Acquisition Date:2022/10/22
CVSS 2.0: 0.0 None CVSS 3.x: 9.8 CRITICAL
This vulnerability may involve a PoC.

Highest Score:231 (2022/10/14)

脆弱性情報:Har-sia CVE-2022-40684


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-41033

Description from NVD

Windows COM+ Event System Service Elevation of Privilege Vulnerability.

Information Acquisition Date:2022/10/13
CVSS 2.0: 0.0 None CVSS 3.x: 7.8 HIGH

Highest Score:60 (2022/10/12)

脆弱性情報:Har-sia CVE-2022-41033


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-41040

Description from NVD

Microsoft Exchange Server Elevation of Privilege Vulnerability.

Information Acquisition Date:2022/10/21
CVSS 2.0: 0.0 None CVSS 3.x: 8.8 HIGH
This vulnerability may involve a PoC.

Description from Forti

Information Acquisition Date:2020/01/22

Affected Products

Impact

Recommended Actions

References


Highest Score:145 (2022/09/30)

脆弱性情報:Har-sia CVE-2022-41040


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-41082

Description from NVD

Microsoft Exchange Server Remote Code Execution Vulnerability.

Information Acquisition Date:2022/10/13
CVSS 2.0: 0.0 None CVSS 3.x: 8.8 HIGH

Description from Forti

Possible New Microsoft Exchange RCE 0-day Being Exploited in the Wild

Information Acquisition Date:2022/10/01

Affected Products

Impact

Recommended Actions

References


Highest Score:146 (2022/09/30)

脆弱性情報:Har-sia CVE-2022-41082


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-41352

Description from NVD

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio.

Information Acquisition Date:2022/10/24
CVSS 2.0: 0.0 None CVSS 3.x: 9.8 CRITICAL

Highest Score:47 (2022/10/17)

脆弱性情報:Har-sia CVE-2022-41352


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-42827


Highest Score:89 (2022/10/25)

脆弱性情報:Har-sia CVE-2022-42827


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-42889

Description from NVD

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

Information Acquisition Date:2022/10/29
CVSS 2.0: 0.0 None CVSS 3.x: 9.8 CRITICAL
This vulnerability may involve a PoC.

Highest Score:158 (2022/10/18)

脆弱性情報:Har-sia CVE-2022-42889


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


計11件

Tweet