Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `analysisd` receives a syscollector message with the `hotfix` `msg_type` but lacking a `timestamp`. It uses `cJSON_GetObjectItem()` to get the `timestamp` object item and dereferences it without checking for a `NULL` value. A malicious client can DoS the analysis engine. This vulnerability is fixed in 4.7.1.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wazuh
Wazuh wazuh |
|
CPEs | cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wazuh
Wazuh wazuh |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T21:53:45.339Z
Reserved: 2023-11-24T16:45:24.311Z
Link: CVE-2023-49275

Updated: 2024-08-02T21:53:45.339Z

Status : Analyzed
Published: 2024-04-19T15:15:49.847
Modified: 2025-01-09T17:42:46.960
Link: CVE-2023-49275

No data.