jasonjberry / CDM

The Common Data Model (CDM) is a standard and extensible collection of schemas (entities, attributes, relationships) that represents business concepts and activities with well-defined semantics, to facilitate data interoperability. Examples of entities include: Account, Contact, Lead, Opportunity, Product, etc.
https://powerplatform.microsoft.com/en-us/common-data-model/
Creative Commons Attribution 4.0 International
0 stars 0 forks source link

CVE-2023-49083 (Medium) detected in cryptography-3.3.1-cp36-abi3-manylinux2010_x86_64.whl #60

Open mend-bolt-for-github[bot] opened 12 months ago

mend-bolt-for-github[bot] commented 12 months ago

CVE-2023-49083 - Medium Severity Vulnerability

Vulnerable Library - cryptography-3.3.1-cp36-abi3-manylinux2010_x86_64.whl

cryptography is a package which provides cryptographic recipes and primitives to Python developers.

Library home page: https://files.pythonhosted.org/packages/c9/de/7054df0620b5411ba45480f0261e1fb66a53f3db31b28e3aa52c026e72d9/cryptography-3.3.1-cp36-abi3-manylinux2010_x86_64.whl

Path to dependency file: /objectModel/Python/requirements.txt

Path to vulnerable library: /objectModel/Python/requirements.txt,/objectModel/Python

Dependency Hierarchy: - :x: **cryptography-3.3.1-cp36-abi3-manylinux2010_x86_64.whl** (Vulnerable Library)

Found in HEAD commit: 2f532047f0b9e231c1602df6a076c534fba6d73a

Found in base branch: master

Vulnerability Details

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.

Publish Date: 2023-11-29

URL: CVE-2023-49083

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-49083

Release Date: 2023-11-29

Fix Resolution: 41.0.6


Step up your Open Source Security Game with Mend here