Search for vulnerabilities
Vulnerability details: VCID-ynzp-han6-tfe5
Vulnerability ID VCID-ynzp-han6-tfe5
Aliases CVE-2023-49582
Summary Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h) Users are recommended to upgrade to APR version 1.7.5, which fixes this issue.
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 5.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-49582.json
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00036 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00037 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-49582
cvssv3.1 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.5 https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4
cvssv3.1 5.5 https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4
ssvc Track https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4
cvssv3 5.5 https://nvd.nist.gov/vuln/detail/CVE-2023-49582
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2023-49582
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-49582.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T17:39:05Z/ Found at https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-49582
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-49582
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.07853
EPSS Score 0.00033
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2024-09-17T19:03:42.748922+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2023-49582 34.0.1