teerth04 / ticket

Other
0 stars 0 forks source link

Findings for Container Security, Medium, [TheRedHatter/javagoof:Dockerfile]:NULL Pointer Dereference #1879

Open armorcodegithubpreprod[bot] opened 3 months ago

armorcodegithubpreprod[bot] commented 3 months ago

Findings for Container Security, Medium, [TheRedHatter/javagoof:Dockerfile]:NULL Pointer Dereference

Component Details

A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

A NULL pointer dereference in the function _TIFFmemcmp at tif_unix.c (called from TIFFWriteDirectoryTagTransferfunction) in LibTIFF 4.0.9 allows an attacker to cause a denial-of-service through a crafted tiff file. This vulnerability can be triggered by the executable tiffcp.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

DISPUTED In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

DISPUTED libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

The vorbis_analysis_wrote function in lib/block.c in Xiph.Org libvorbis 1.3.5 allows remote attackers to cause a denial of service (OOM) via a crafted wav file.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



armorcodegithubpreprod[bot] commented 3 months ago

Finding [47833336|https://preprod.armorcode.ai/#/findings/257/1167/47833336], [47833217|https://preprod.armorcode.ai/#/findings/257/1167/47833217], [47833316|https://preprod.armorcode.ai/#/findings/257/1167/47833316], [47833218|https://preprod.armorcode.ai/#/findings/257/1167/47833218], [47833317|https://preprod.armorcode.ai/#/findings/257/1167/47833317], [47832976|https://preprod.armorcode.ai/#/findings/257/1167/47832976], [47833308|https://preprod.armorcode.ai/#/findings/257/1167/47833308], [47833240|https://preprod.armorcode.ai/#/findings/257/1167/47833240], [47833321|https://preprod.armorcode.ai/#/findings/257/1167/47833321], [47833210|https://preprod.armorcode.ai/#/findings/257/1167/47833210], [47833334|https://preprod.armorcode.ai/#/findings/257/1167/47833334], [47833224|https://preprod.armorcode.ai/#/findings/257/1167/47833224], [47833213|https://preprod.armorcode.ai/#/findings/257/1167/47833213], [47832981|https://preprod.armorcode.ai/#/findings/257/1167/47832981], [47833333|https://preprod.armorcode.ai/#/findings/257/1167/47833333] are Mitigated
by SYSTEM via ArmorCode Platform

armorcodegithubpreprod[bot] commented 3 months ago

Finding [47832981|https://preprod.armorcode.ai/#/findings/257/1167/47832981] , [47833218|https://preprod.armorcode.ai/#/findings/257/1167/47833218] , [47833240|https://preprod.armorcode.ai/#/findings/257/1167/47833240] , [47833308|https://preprod.armorcode.ai/#/findings/257/1167/47833308] , [47833333|https://preprod.armorcode.ai/#/findings/257/1167/47833333] , [47833336|https://preprod.armorcode.ai/#/findings/257/1167/47833336] , [47833217|https://preprod.armorcode.ai/#/findings/257/1167/47833217] , [47833316|https://preprod.armorcode.ai/#/findings/257/1167/47833316] , [47833317|https://preprod.armorcode.ai/#/findings/257/1167/47833317] , [47833334|https://preprod.armorcode.ai/#/findings/257/1167/47833334] , [47833224|https://preprod.armorcode.ai/#/findings/257/1167/47833224] , [47833210|https://preprod.armorcode.ai/#/findings/257/1167/47833210] , [47832976|https://preprod.armorcode.ai/#/findings/257/1167/47832976] , [47833213|https://preprod.armorcode.ai/#/findings/257/1167/47833213] , [47833321|https://preprod.armorcode.ai/#/findings/257/1167/47833321] status changed to Confirmed Note:
by SYSTEM via ArmorCode Platform