CVE-2022-44455

The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*
cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*

History

09 Sep 2024, 12:21

Type Values Removed Values Added
First Time Openatom
Openatom openharmony
CPE cpe:2.3:a:openharmony:openharmony:*:*:*:*:lts:*:*:* cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*

12 Dec 2022, 15:49

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-08 16:15

Updated : 2024-09-09 12:21


NVD link : CVE-2022-44455

Mitre link : CVE-2022-44455

CVE.ORG link : CVE-2022-44455


JSON object : View

Products Affected

openatom

  • openharmony

openharmony

  • openharmony
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')