7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
61.6%
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based
buffer overflow has been discovered in the RPC protocol used by p11-kit
server/remote commands and the client library. When the remote entity
supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity
may not allocate sufficient length for the buffer to store the deserialized
value.
github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x
launchpad.net/bugs/cve/CVE-2020-29363
lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
nvd.nist.gov/vuln/detail/CVE-2020-29363
security-tracker.debian.org/tracker/CVE-2020-29363
ubuntu.com/security/notices/USN-4677-1
www.cve.org/CVERecord?id=CVE-2020-29363
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
61.6%