Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (℀), or U+2105 (℅) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Sep 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yeti-platform
Yeti-platform yeti |
|
CPEs | cpe:2.3:a:yeti-platform:yeti:*:*:*:*:*:*:*:* | |
Vendors & Products |
Yeti-platform
Yeti-platform yeti |
Tue, 10 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (℀), or U+2105 (℅) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11. | |
Title | Yeti affected by a Potential Denial of Service due to the One Milion Unicode characters attack | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-10T15:19:40.623Z
Updated: 2024-09-10T16:09:40.822Z
Reserved: 2024-08-28T20:21:32.805Z
Link: CVE-2024-45412
Vulnrichment
Updated: 2024-09-10T16:08:29.677Z
NVD
Status : Modified
Published: 2024-09-10T16:15:20.850
Modified: 2024-11-21T09:37:44.827
Link: CVE-2024-45412
Redhat
No data.