Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (℀), or U+2105 (℅) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11.
History

Fri, 20 Sep 2024 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Yeti-platform
Yeti-platform yeti
CPEs cpe:2.3:a:yeti-platform:yeti:*:*:*:*:*:*:*:*
Vendors & Products Yeti-platform
Yeti-platform yeti

Tue, 10 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Description Yeti bridges the gap between CTI and DFIR practitioners by providing a Forensics Intelligence platform and pipeline. Remote user-controlled data tags can reach a Unicode normalization with a compatibility form NFKD. Under Windows, such normalization is costly in resources and may lead to denial of service with attacks such as One Million Unicode payload. This can get worse with the use of special Unicode characters like U+2100 (℀), or U+2105 (℅) which could lead the payload size to be tripled. Versions prior to 2.1.11 are affected by this vulnerability. The patch is included in 2.1.11.
Title Yeti affected by a Potential Denial of Service due to the One Milion Unicode characters attack
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-10T15:19:40.623Z

Updated: 2024-09-10T16:09:40.822Z

Reserved: 2024-08-28T20:21:32.805Z

Link: CVE-2024-45412

cve-icon Vulnrichment

Updated: 2024-09-10T16:08:29.677Z

cve-icon NVD

Status : Modified

Published: 2024-09-10T16:15:20.850

Modified: 2024-11-21T09:37:44.827

Link: CVE-2024-45412

cve-icon Redhat

No data.