A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable.
References
Link | Resource |
---|---|
https://kcm.trellix.com/corporate/index?page=content&id=SB10396 | Vendor Advisory |
https://kcm.trellix.com/corporate/index?page=content&id=SB10396 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:38
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References | () https://kcm.trellix.com/corporate/index?page=content&id=SB10396 - Vendor Advisory |
07 Nov 2023, 04:02
Type | Values Removed | Values Added |
---|---|---|
Summary | A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable. |
Information
Published : 2023-04-03 16:15
Updated : 2024-11-21 07:38
NVD link : CVE-2023-0977
Mitre link : CVE-2023-0977
CVE.ORG link : CVE-2023-0977
JSON object : View
Products Affected
linux
- linux_kernel
trellix
- agent
microsoft
- windows