Lucene search

K
cvelistVulDBCVELIST:CVE-2020-36646
HistoryJan 07, 2023 - 7:34 p.m.

CVE-2020-36646 MediaArea ZenLib Ztring.cpp Date_From_Seconds_1970_Local unknown vulnerability

2023-01-0719:34:51
CWE-690
VulDB
www.cve.org
cve-2020-36646
mediaarea zenlib
ztring.cpp
date_from_seconds_1970_local
vulnerability
unchecked return value
null pointer dereference
patch 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408
upgrade recommended
vdb-217629

2.3 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:M/Au:S/C:N/I:N/A:P

3.5 Low

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

0.007 Low

EPSS

Percentile

80.8%

A vulnerability classified as problematic has been found in MediaArea ZenLib up to 0.4.38. This affects the function Ztring::Date_From_Seconds_1970_Local of the file Source/ZenLib/Ztring.cpp. The manipulation of the argument Value leads to unchecked return value to null pointer dereference. Upgrading to version 0.4.39 is able to address this issue. The identifier of the patch is 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. It is recommended to upgrade the affected component. The identifier VDB-217629 was assigned to this vulnerability.

CNA Affected

[
  {
    "vendor": "MediaArea",
    "product": "ZenLib",
    "versions": [
      {
        "version": "0.4.0",
        "status": "affected"
      },
      {
        "version": "0.4.1",
        "status": "affected"
      },
      {
        "version": "0.4.2",
        "status": "affected"
      },
      {
        "version": "0.4.3",
        "status": "affected"
      },
      {
        "version": "0.4.4",
        "status": "affected"
      },
      {
        "version": "0.4.5",
        "status": "affected"
      },
      {
        "version": "0.4.6",
        "status": "affected"
      },
      {
        "version": "0.4.7",
        "status": "affected"
      },
      {
        "version": "0.4.8",
        "status": "affected"
      },
      {
        "version": "0.4.9",
        "status": "affected"
      },
      {
        "version": "0.4.10",
        "status": "affected"
      },
      {
        "version": "0.4.11",
        "status": "affected"
      },
      {
        "version": "0.4.12",
        "status": "affected"
      },
      {
        "version": "0.4.13",
        "status": "affected"
      },
      {
        "version": "0.4.14",
        "status": "affected"
      },
      {
        "version": "0.4.15",
        "status": "affected"
      },
      {
        "version": "0.4.16",
        "status": "affected"
      },
      {
        "version": "0.4.17",
        "status": "affected"
      },
      {
        "version": "0.4.18",
        "status": "affected"
      },
      {
        "version": "0.4.19",
        "status": "affected"
      },
      {
        "version": "0.4.20",
        "status": "affected"
      },
      {
        "version": "0.4.21",
        "status": "affected"
      },
      {
        "version": "0.4.22",
        "status": "affected"
      },
      {
        "version": "0.4.23",
        "status": "affected"
      },
      {
        "version": "0.4.24",
        "status": "affected"
      },
      {
        "version": "0.4.25",
        "status": "affected"
      },
      {
        "version": "0.4.26",
        "status": "affected"
      },
      {
        "version": "0.4.27",
        "status": "affected"
      },
      {
        "version": "0.4.28",
        "status": "affected"
      },
      {
        "version": "0.4.29",
        "status": "affected"
      },
      {
        "version": "0.4.30",
        "status": "affected"
      },
      {
        "version": "0.4.31",
        "status": "affected"
      },
      {
        "version": "0.4.32",
        "status": "affected"
      },
      {
        "version": "0.4.33",
        "status": "affected"
      },
      {
        "version": "0.4.34",
        "status": "affected"
      },
      {
        "version": "0.4.35",
        "status": "affected"
      },
      {
        "version": "0.4.36",
        "status": "affected"
      },
      {
        "version": "0.4.37",
        "status": "affected"
      },
      {
        "version": "0.4.38",
        "status": "affected"
      }
    ]
  }
]

2.3 Low

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:M/Au:S/C:N/I:N/A:P

3.5 Low

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

0.007 Low

EPSS

Percentile

80.8%