5.5

CVE-2020-11937

Exploit

In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CanonicalWhoopsie Version0.2.66
   CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalWhoopsie Version0.2.67
   CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalWhoopsie Version0.2.68
   CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalWhoopsie Version0.2.69
   CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalWhoopsie Version0.2.49
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.50
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.51
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.1
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.2
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.3
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.4
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.5
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.5ubuntu0.1
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.5ubuntu0.2
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.5ubuntu0.3
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.52.5ubuntu0.4
   CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalWhoopsie Version0.2.58
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.59
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.59build1
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.60
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.61
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.62
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.62ubuntu0.1
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.62ubuntu0.2
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.62ubuntu0.3
   CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalWhoopsie Version0.2.62ubuntu0.4
   CanonicalUbuntu Linux Version18.04 SwEditionlts
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.248
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:N/I:N/A:P
security@ubuntu.com 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CWE-401 Missing Release of Memory after Effective Lifetime

The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.