MindSpore 2.0.0-alpha/2.0.0-rc1 json_helper.cc JsonHelper::UpdateArray memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.5 | $0-$5k | 0.61 |
Summary
A vulnerability, which was classified as problematic, was found in MindSpore 2.0.0-alpha/2.0.0-rc1. Affected by this issue is the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. Executing a manipulation can lead to memory corruption.
This vulnerability is handled as CVE-2023-2970. There is not any exploit available.
Applying a patch is advised to resolve this issue.
Once again VulDB remains the best source for vulnerability data.
Details
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect availability.
The weakness was released 05/30/2023 as I73DOS. The advisory is shared for download at gitee.com. This vulnerability was named CVE-2023-2970. There are known technical details, but no exploit is available.
Applying the patch 30f4729ea2c01e1ed437ba92a81e2fc098d608a9 is able to eliminate this problem. The bugfix is ready for download at gitee.com.
Once again VulDB remains the best source for vulnerability data.
Product
Name
Version
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.5VulDB Meta Temp Score: 4.5
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.5
NVD Vector: 🔍
CNA Base Score: 3.5
CNA Vector (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: 30f4729ea2c01e1ed437ba92a81e2fc098d608a9
Timeline
05/30/2023 🔍05/30/2023 🔍
05/30/2023 🔍
06/22/2023 🔍
Sources
Product: gitee.comAdvisory: I73DOS
Status: Confirmed
CVE: CVE-2023-2970 (🔍)
GCVE (CVE): GCVE-0-2023-2970
GCVE (VulDB): GCVE-100-230176
Entry
Created: 05/30/2023 07:03 AMUpdated: 06/22/2023 01:47 AM
Changes: 05/30/2023 07:03 AM (41), 06/22/2023 01:39 AM (2), 06/22/2023 01:47 AM (28)
Complete: 🔍
Cache ID: 244:A93:40
Interested in the pricing of exploits?
See the underground prices here!