Lucene search

K
mageiaGentoo FoundationMGASA-2023-0122
HistoryMar 31, 2023 - 3:13 a.m.

Updated dino packages fix security vulnerability

2023-03-3103:13:46
Gentoo Foundation
advisories.mageia.org
10
dino client
crafted message
unauthorized sender
user interaction
security vulnerability
unix

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

0.003 Low

EPSS

Percentile

68.3%

When a Dino client receives a specifically crafted message from an unauthorized sender, it would use information from that message to add, update or remove entries in the user’s personal bookmark store without requiring further user interaction. (CVE-2023-28686)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchdino< 0.2.3-1dino-0.2.3-1.mga8

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

0.003 Low

EPSS

Percentile

68.3%