Lucene search

K
cvelistNCSC.chCVELIST:CVE-2023-6481
HistoryDec 04, 2023 - 8:35 a.m.

CVE-2023-6481 Logback "receiver" DOS vulnerability CVE-2023-6378 incomplete fix

2023-12-0408:35:44
NCSC.ch
www.cve.org
cve-2023-6481
logback
receiver
dos
vulnerability
incomplete fix
serialization
1.4.13
1.3.13
1.2.12
denial-of-service
attack
poisoned data

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%

A serialization vulnerability in logback receiver component part of
logback version 1.4.13,Β 1.3.13 andΒ 1.2.12 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "logback receiver"
    ],
    "platforms": [
      "Windows",
      "Linux",
      "MacOS"
    ],
    "product": "logback",
    "repo": "https://github.com/qos-ch/logback",
    "vendor": "QOS.CH Sarl",
    "versions": [
      {
        "status": "unaffected",
        "version": "1.4.14"
      },
      {
        "status": "unaffected",
        "version": "1.3.14"
      },
      {
        "status": "unaffected",
        "version": "1.2.13"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%