Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-38315
HistoryNov 17, 2023 - 6:15 a.m.

CVE-2023-38315

2023-11-1706:15:33
Debian Security Bug Tracker
security-tracker.debian.org
8
opennds
captive portal
http
null pointer
denial-of-service
cve-2023-38315

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.3%

An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a try_to_authenticate NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing client token query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3.

OSVersionArchitecturePackageVersionFilename
Debian12allopennds<= 9.10.0-1opennds_9.10.0-1_all.deb
Debian999allopennds< 10.2.0+dfsg-1opennds_10.2.0+dfsg-1_all.deb

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.3%

Related for DEBIANCVE:CVE-2023-38315