Vulnerability Name:

CVE-2022-25308 (CCN-229319)

Assigned:2021-12-21
Published:2021-12-21
Updated:2023-02-12
Summary:A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.0 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.1 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.0 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-121
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2022-25308

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla – Bug 2047890
(CVE-2022-25308) - CVE-2022-25308 fribidi: Stack based buffer overflow

Source: secalert@redhat.com
Type: Issue Tracking, Third Party Advisory
secalert@redhat.com

Source: XF
Type: UNKNOWN
gnufribidi-cve202225308-bo(229319)

Source: CCN
Type: FriBidi GIT Repository
stack-buffer-overflow on address 0x7ffda2c0112f at pc 0x5580929d7ab5 bp 0x7ffda2bc1820 sp 0x7ffda2bc1810 #181

Source: secalert@redhat.com
Type: Exploit, Patch, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Exploit, Third Party Advisory
secalert@redhat.com

Source: CCN
Type: SNYK-UNMANAGED-FRIBIDIFRIBIDI-2405696
Buffer Overflow

Source: CCN
Type: IBM Security Bulletin 6843925 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance may be vulnerable to arbitrary code execution due to CVE-2022-25308

Source: CCN
Type: Mend Vulnerability Database
CVE-2022-25308

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7498
    P
    fribidi-1.0.10-150400.3.3.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7931
    P
    libfribidi0-32bit-1.0.10-150400.3.3.1 on GA media (Moderate)
    2023-06-12
    oval:com.redhat.rhsa:def:20228011
    P
    RHSA-2022:8011: fribidi security update (Moderate)
    2022-11-15
    oval:com.redhat.rhsa:def:20227514
    P
    RHSA-2022:7514: fribidi security update (Moderate)
    2022-11-08
    oval:org.opensuse.security:def:3606
    P
    libicu-doc-52.1-8.7.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3674
    P
    libsnmp30-32bit-5.7.3-6.6.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:95236
    P
    Security update for fribidi (Moderate)
    2022-05-31
    oval:org.opensuse.security:def:506
    P
    Security update for fribidi (Moderate)
    2022-05-31
    oval:org.opensuse.security:def:95304
    P
    Security update for fribidi (Moderate)
    2022-05-31
    oval:org.opensuse.security:def:5261
    P
    Security update for fribidi (Moderate)
    2022-05-25
    oval:org.opensuse.security:def:901
    P
    Security update for fribidi (Moderate)
    2022-05-25
    oval:org.opensuse.security:def:42390
    P
    Security update for fribidi (Moderate)
    2022-05-25
    oval:org.opensuse.security:def:6055
    P
    Security update for fribidi (Moderate)
    2022-05-25
    oval:org.opensuse.security:def:1072
    P
    Security update for fribidi (Moderate)
    2022-05-25
    BACK
    ibm app connect enterprise certified container 4.2