WEKA INTEREST Security Scanner up to 1.8 Portscan memory allocation

A vulnerability has been found in WEKA INTEREST Security Scanner up to 1.8 and classified as problematic. This vulnerability affects unknown code of the component Portscan. The manipulation leads to uncontrolled memory allocation. Using CWE to declare the problem leads to CWE-789. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The bug was discovered 07/30/2007. The weakness was shared 06/05/2017 by Marc Ruef with scip AG as ID 101969 as Entry (VulDB). The advisory is available at vuldb.com. The vendor was not involved in the coordination of the public release. This vulnerability was named CVE-2017-20016. The attack can be initiated remotely. There are no technical details available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. It is declared as proof-of-concept. It is possible to download the exploit at vuldb.com. The vulnerability was handled as a non-public zero-day exploit for at least 3598 days. As 0-day the estimated underground price was around $0-$5k. A possible alternative is ATK - Attack Tool Kit. It is recommended to replace the affected component with an alternative. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

177

Field

vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2
exploit_price_0day2
vulnerability_cvss3_cna_basescore1
vulnerability_cvss3_nvd_basescore1

Commit Conf

100%56
70%24
90%14
98%2

Approve Conf

100%56
70%24
90%14
98%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1334341212/07/2022VulD...cvss3_cna_basescore4.3see CVSS documentation12/07/2022accepted
90
1334341112/07/2022VulD...cvss3_nvd_basescore7.5nist.gov12/07/2022accepted
90
1334341012/07/2022VulD...cvss2_nvd_basescore5.0nist.gov12/07/2022accepted
90
1334340912/07/2022VulD...cvss3_meta_tempscore5.3see CVSS documentation12/07/2022accepted
90
1334340812/07/2022VulD...cvss3_meta_basescore5.4see CVSS documentation12/07/2022accepted
90
1334340712/07/2022VulD...cvss3_cna_aLnvd.nist.gov12/07/2022accepted
70
1334340612/07/2022VulD...cvss3_cna_iNnvd.nist.gov12/07/2022accepted
70
1334340512/07/2022VulD...cvss3_cna_cNnvd.nist.gov12/07/2022accepted
70
1334340412/07/2022VulD...cvss3_cna_sUnvd.nist.gov12/07/2022accepted
70
1334340312/07/2022VulD...cvss3_cna_uiRnvd.nist.gov12/07/2022accepted
70
1334340212/07/2022VulD...cvss3_cna_prNnvd.nist.gov12/07/2022accepted
70
1334340112/07/2022VulD...cvss3_cna_acLnvd.nist.gov12/07/2022accepted
70
1334340012/07/2022VulD...cvss3_cna_avNnvd.nist.gov12/07/2022accepted
70
1334339912/07/2022VulD...cvss2_nvd_aiPnvd.nist.gov12/07/2022accepted
70
1334339812/07/2022VulD...cvss2_nvd_iiNnvd.nist.gov12/07/2022accepted
70
1334339712/07/2022VulD...cvss2_nvd_ciNnvd.nist.gov12/07/2022accepted
70
1334339612/07/2022VulD...cvss2_nvd_auNnvd.nist.gov12/07/2022accepted
70
1334339512/07/2022VulD...cvss2_nvd_acLnvd.nist.gov12/07/2022accepted
70
1334339412/07/2022VulD...cvss2_nvd_avNnvd.nist.gov12/07/2022accepted
70
1334339312/07/2022VulD...cvss3_nvd_aHnvd.nist.gov12/07/2022accepted
70

76 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!