Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-26292
HistoryJan 04, 2021 - 6:10 p.m.

CVE-2020-26292 Potential Malware Discovered (Possible False Positive)

2021-01-0418:10:12
CWE-507
GitHub_M
www.cve.org
malware
creeper interpreter
binary release
december 26 2020
antivirus scanner

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

60.7%

Creeper is an experimental dynamic, interpreted language. The binary release of Creeper Interpreter 1.1.3 contains potential malware. The compromised binary release was available for a few hours between December 26, 2020 at 3:22 PM EST to December 26, 2020 at 11:00 PM EST. If you used the source code, you are NOT affected. This only affects the binary releases. The binary of unknown quality has been removed from the release. If you have downloaded the binary, please delete it and run a reputable antivirus scanner to ensure that your computer is clean.

CNA Affected

[
  {
    "product": "Creeper",
    "vendor": "chatter-social",
    "versions": [
      {
        "status": "affected",
        "version": "= 1.1.3"
      }
    ]
  }
]

CVSS3

3.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

60.7%

Related for CVELIST:CVE-2020-26292