| Vulnerability Name: | CVE-2018-11693 (CCN-144323) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-06-03 | ||||||||||||||||||||||||||||||||||||
| Published: | 2018-06-03 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2019-03-11 | ||||||||||||||||||||||||||||||||||||
| Summary: | An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::skip_over_scopes which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:U/RC:R)
3.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-11693 Source: CCN Type: IBM Security Bulletin 794165 (API Connect) IBM API Connect is impacted by multiple open source software vulnerabilities. Source: XF Type: UNKNOWN libsaas-cve201811693-info-disc(144323) Source: CCN Type: libsass GIT Repository AddressSanitizer: heap-buffer-overflow (OOB read) in Sass::Prelexer::skip_over_scopes (libsass/src/prelexer.hpp:69:14) #2661 Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://github.com/sass/libsass/issues/2661 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||