Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-41464 | Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (℀), or U+2105 (℅) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Sep 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yeti-platform
Yeti-platform yeti |
|
| CPEs | cpe:2.3:a:yeti-platform:yeti:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yeti-platform
Yeti-platform yeti |
Tue, 10 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (℀), or U+2105 (℅) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11. | |
| Title | Yeti affected by a Potential Denial of Service due to the One Milion Unicode characters attack | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-10T16:09:40.822Z
Reserved: 2024-08-28T20:21:32.805Z
Link: CVE-2024-45412
Updated: 2024-09-10T16:08:29.677Z
Status : Modified
Published: 2024-09-10T16:15:20.850
Modified: 2024-11-21T09:37:44.827
Link: CVE-2024-45412
No data.
OpenCVE Enrichment
No data.
EUVD