Lucene search

K
cveTrellixCVE-2024-0213
HistoryJan 09, 2024 - 2:15 p.m.

CVE-2024-0213

2024-01-0914:15:46
CWE-120
trellix
web.nvd.nist.gov
17
cve-2024-0213
buffer overflow
linux
macos
ta
root
memory corruption
dos
epo
input validation

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.

Affected configurations

Nvd
Node
trellixagentRange<5.8.1linux
OR
trellixagentRange<5.8.1macos
VendorProductVersionCPE
trellixagent*cpe:2.3:a:trellix:agent:*:*:*:*:linux:*:*:*
trellixagent*cpe:2.3:a:trellix:agent:*:*:*:*:macos:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Trellix Agent (TA)",
    "vendor": "Trellix",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to 5.8.1"
      }
    ]
  }
]

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CVE-2024-0213