{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"MongoDB Server","vendor":"MongoDB Inc.","versions":[{"lessThan":"4.2.9","status":"affected","version":"4.2","versionType":"custom"},{"lessThan":"4.4.0-rc12","status":"affected","version":"4.4","versionType":"custom"}]}],"datePublic":"2020-11-30T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Incorrect validation of user input in the role name parser may lead to use of uninitialized memory allowing an unauthenticated attacker to use a specially crafted request to cause a denial of service. This issue affects MongoDB Server v4.4 versions prior to 4.4.0-rc12; MongoDB Server v4.2 versions prior to 4.2.9.</p>"}],"value":"Incorrect validation of user input in the role name parser may lead to use of uninitialized memory allowing an unauthenticated attacker to use a specially crafted request to cause a denial of service. This issue affects MongoDB Server v4.4 versions prior to 4.4.0-rc12; MongoDB Server v4.2 versions prior to 4.2.9."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-475","description":"CWE-475 Undefined Behavior for Input to API","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a39b4221-9bd0-4244-95fc-f3e2e07f1deb","shortName":"mongodb","dateUpdated":"2024-01-23T15:38:49.622Z"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://jira.mongodb.org/browse/SERVER-49142"}],"source":{"discovery":"INTERNAL"},"title":"Denial of Service when processing malformed Role names","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@mongodb.com","DATE_PUBLIC":"2020-11-30T14:00:00.000Z","ID":"CVE-2020-7925","STATE":"PUBLIC","TITLE":"Denial of Service when processing malformed Role names"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MongoDB Server","version":{"version_data":[{"version_affected":"<","version_name":"4.2","version_value":"4.2.9"},{"version_affected":"<","version_name":"4.4","version_value":"4.4.0-rc12"}]}}]},"vendor_name":"MongoDB Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Incorrect validation of user input in the role name parser may lead to use of uninitialized memory allowing an unauthenticated attacker to use a specially crafted request to cause a denial of service. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.0-rc12; v4.2 versions prior to 4.2.9."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-475 Undefined Behavior for Input to API"}]}]},"references":{"reference_data":[{"name":"https://jira.mongodb.org/browse/SERVER-49142","refsource":"CONFIRM","url":"https://jira.mongodb.org/browse/SERVER-49142"}]},"source":{"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T09:48:23.889Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://jira.mongodb.org/browse/SERVER-49142"}]}]},"cveMetadata":{"assignerOrgId":"a39b4221-9bd0-4244-95fc-f3e2e07f1deb","assignerShortName":"mongodb","cveId":"CVE-2020-7925","datePublished":"2020-11-23T14:50:12.258Z","dateReserved":"2020-01-23T00:00:00.000Z","dateUpdated":"2024-09-17T00:20:32.900Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}