CVE-2012-4551
Published Nov 30, 2012
Last updated 12 years ago
Overview
- Description
- Use-after-free vulnerability in libunity-webapps before 2.4.1 allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted web site, related to "certain hash tables."
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47B7CFBA-31C8-470E-A18A-880B52EF5DA4", "versionEndIncluding": "2.4.0" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1F49165-80B8-4151-B0E5-51B6ED8E032F" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "130CB642-21AC-4929-847F-76D9B917F368" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A771A13-5749-4C37-9190-A6CD15C3B6CF" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B593C75D-0356-4F8E-9EDB-47C007B20F41" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A00C2101-E822-4725-AC15-B87B04C8BAC1" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "742A65FE-13E4-4419-B6D8-156DC1AB71FF" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFC5700D-2526-4E83-AC15-B63B2B0A5DE2" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93465EAA-55D2-40A7-8639-DFA0B855B980" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A65D340A-9B8B-4694-88DC-A7BFA905548E" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D124800-C155-4F84-A115-970BD0CB2E7A" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1440637-2425-493E-AE9D-226615B2B384" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1D3DCFB-8285-4C7D-B2D8-FEA1FED0B4DC" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEAA1725-7671-4A2A-B99D-86ECEF4D1D43" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A5DA396-498F-4EA2-A133-B86FB3C5F1A7" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B9C812E-A01F-4683-BF1F-56BBBC236982" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FA0DA0F-25F9-4CEA-B11C-AE26581E9E5F" }, { "criteria": "cpe:2.3:a:ps_project_management_team:libunity-webapps:2.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2075FD1-E2E5-4C69-87DA-EFA5E0907309" } ], "operator": "OR" } ] } ]