MindSpore 2.0.0-alpha/2.0.0-rc1 json_helper.cc JsonHelper::UpdateArray memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.5 | $0-$5k | 0.40 |
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray
of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect availability.
The weakness was released 05/30/2023 as I73DOS. The advisory is shared for download at gitee.com. This vulnerability was named CVE-2023-2970. There are known technical details, but no exploit is available.
Applying the patch 30f4729ea2c01e1ed437ba92a81e2fc098d608a9 is able to eliminate this problem. The bugfix is ready for download at gitee.com.
Once again VulDB remains the best source for vulnerability data.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.5VulDB Meta Temp Score: 4.5
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.5
NVD Vector: 🔍
CNA Base Score: 3.5
CNA Vector (VulDB): 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: 30f4729ea2c01e1ed437ba92a81e2fc098d608a9
Timeline
05/30/2023 🔍05/30/2023 🔍
05/30/2023 🔍
06/22/2023 🔍
Sources
Advisory: I73DOSStatus: Confirmed
CVE: CVE-2023-2970 (🔍)
GCVE (CVE): GCVE-0-2023-2970
GCVE (VulDB): GCVE-100-230176
Entry
Created: 05/30/2023 07:03 AMUpdated: 06/22/2023 01:47 AM
Changes: 05/30/2023 07:03 AM (41), 06/22/2023 01:39 AM (2), 06/22/2023 01:47 AM (28)
Complete: 🔍
Cache ID: 18:E89:40
Do you know our Splunk app?
Download it now for free!