cvelist/2018/8xxx/CVE-2018-8549.json

72 lines
2.3 KiB
JSON
Raw Normal View History

2018-03-14 14:03:48 -04:00
{
2019-03-17 22:05:20 +00:00
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2018-8549",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
2019-03-17 22:05:20 +00:00
"lang": "eng",
"value": "A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka \"Windows Security Feature Bypass Vulnerability.\" This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers."
}
2019-03-17 22:05:20 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8549",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8549"
},
{
"name": "1042138",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042138"
},
{
"name": "105803",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105803"
}
]
}
}