Vulnerability Details CVE-2020-29363
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 31.6%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-29363
-
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.10
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.11
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.12
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.13
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.14
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.15
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.16
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.16.1
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.17
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.18
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.18.1
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.19
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.20
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.21
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.6
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.7
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.8
-
cpe:2.3:a:p11-kit_project:p11-kit:0.23.9
-
cpe:2.3:o:debian:debian_linux:10.0