scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a buffer overflow associated with a webauthn assertion.
References
Link | Resource |
---|---|
https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a | Patch Third Party Advisory |
https://github.com/babelouest/glewlwyd/releases/tag/v2.6.2 | Release Notes Third Party Advisory |
Configurations
History
25 Mar 2022, 18:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
References | (MISC) https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a - Patch, Third Party Advisory | |
References | (MISC) https://github.com/babelouest/glewlwyd/releases/tag/v2.6.2 - Release Notes, Third Party Advisory | |
CPE | cpe:2.3:a:glewlwyd_sso_server_project:glewlwyd_sso_server:*:*:*:*:*:*:*:* | |
CWE | CWE-120 |
18 Mar 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-18 06:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-27240
Mitre link : CVE-2022-27240
CVE.ORG link : CVE-2022-27240
JSON object : View
Products Affected
glewlwyd_sso_server_project
- glewlwyd_sso_server
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')