Lucene search

K
cve[email protected]CVE-2023-50268
HistoryDec 13, 2023 - 9:15 p.m.

CVE-2023-50268

2023-12-1321:15:09
CWE-120
CWE-121
CWE-787
web.nvd.nist.gov
13
jq
json processor
cve-2023-50268
stack-based buffer overflow
vulnerability
nvd

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.

Affected configurations

Vulners
NVD
Node
jqlangjqMatch1.7
VendorProductVersionCPE
jqlangjq1.7cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jqlang",
    "product": "jq",
    "versions": [
      {
        "version": "= 1.7",
        "status": "affected"
      }
    ]
  }
]

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%