cvelist/2018/2xxx/CVE-2018-2792.json

73 lines
3.2 KiB
JSON
Raw Normal View History

2018-04-18 22:05:58 -04:00
{
2019-03-18 04:16:09 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2018-2792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SSM - (ssm_host_apps) HMP: Hardware Management Pack",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "2.4.3"
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
Committer: Bill Situ <Bill.Situ@Oracle.com> On branch cna/oracle/OracleCPUApr2018 Changes to be committed: modified: 2013/1xxx/CVE-2013-1768.json modified: 2014/0xxx/CVE-2014-0054.json modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/2xxx/CVE-2016-2177.json modified: 2016/2xxx/CVE-2016-2178.json modified: 2016/2xxx/CVE-2016-2179.json modified: 2016/2xxx/CVE-2016-2180.json modified: 2016/2xxx/CVE-2016-2181.json modified: 2016/2xxx/CVE-2016-2182.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/3xxx/CVE-2016-3506.json modified: 2016/5xxx/CVE-2016-5007.json modified: 2016/5xxx/CVE-2016-5019.json modified: 2016/6xxx/CVE-2016-6302.json modified: 2016/6xxx/CVE-2016-6303.json modified: 2016/6xxx/CVE-2016-6304.json modified: 2016/6xxx/CVE-2016-6305.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6307.json modified: 2016/6xxx/CVE-2016-6308.json modified: 2016/6xxx/CVE-2016-6309.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/7xxx/CVE-2016-7052.json modified: 2016/8xxx/CVE-2016-8745.json modified: 2016/9xxx/CVE-2016-9878.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/13xxx/CVE-2017-13077.json modified: 2017/13xxx/CVE-2017-13078.json modified: 2017/13xxx/CVE-2017-13080.json modified: 2017/13xxx/CVE-2017-13082.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/15xxx/CVE-2017-15707.json modified: 2017/17xxx/CVE-2017-17562.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3737.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5753.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7674.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/2xxx/CVE-2018-2563.json modified: 2018/2xxx/CVE-2018-2572.json modified: 2018/2xxx/CVE-2018-2587.json modified: 2018/2xxx/CVE-2018-2628.json modified: 2018/2xxx/CVE-2018-2718.json modified: 2018/2xxx/CVE-2018-2737.json modified: 2018/2xxx/CVE-2018-2738.json modified: 2018/2xxx/CVE-2018-2739.json modified: 2018/2xxx/CVE-2018-2742.json modified: 2018/2xxx/CVE-2018-2746.json modified: 2018/2xxx/CVE-2018-2747.json modified: 2018/2xxx/CVE-2018-2748.json modified: 2018/2xxx/CVE-2018-2749.json modified: 2018/2xxx/CVE-2018-2750.json modified: 2018/2xxx/CVE-2018-2752.json modified: 2018/2xxx/CVE-2018-2753.json modified: 2018/2xxx/CVE-2018-2754.json modified: 2018/2xxx/CVE-2018-2755.json modified: 2018/2xxx/CVE-2018-2756.json modified: 2018/2xxx/CVE-2018-2758.json modified: 2018/2xxx/CVE-2018-2759.json modified: 2018/2xxx/CVE-2018-2760.json modified: 2018/2xxx/CVE-2018-2761.json modified: 2018/2xxx/CVE-2018-2762.json modified: 2018/2xxx/CVE-2018-2763.json modified: 2018/2xxx/CVE-2018-2764.json modified: 2018/2xxx/CVE-2018-2765.json modified: 2018/2xxx/CVE-2018-2766.json modified: 2018/2xxx/CVE-2018-2768.json modified: 2018/2xxx/CVE-2018-2769.json modified: 2018/2xxx/CVE-2018-2770.json modified: 2018/2xxx/CVE-2018-2771.json modified: 2018/2xxx/CVE-2018-2772.json modified: 2018/2xxx/CVE-2018-2773.json modified: 2018/2xxx/CVE-2018-2774.json modified: 2018/2xxx/CVE-2018-2775.json modified: 2018/2xxx/CVE-2018-2776.json modified: 2018/2xxx/CVE-2018-2777.json modified: 2018/2xxx/CVE-2018-2778.json modified: 2018/2xxx/CVE-2018-2779.json modified: 2018/2xxx/CVE-2018-2780.json modified: 2018/2xxx/CVE-2018-2781.json modified: 2018/2xxx/CVE-2018-2782.json modified: 2018/2xxx/CVE-2018-2783.json modified: 2018/2xxx/CVE-2018-2784.json modified: 2018/2xxx/CVE-2018-2785.json modified: 2018/2xxx/CVE-2018-2786.json modified: 2018/2xxx/CVE-2018-2787.json modified: 2018/2xxx/CVE-2018-2788.json modified: 2018/2xxx/CVE-2018-2789.json modified: 2018/2xxx/CVE-2018-2790.json modified: 2018/2xxx/CVE-2018-2791.json modified: 2018/2xxx/CVE-2018-2792.json modified: 2018/2xxx/CVE-2018-2793.json modified: 2018/2xxx/CVE-2018-2794.json modified: 2018/2xxx/CVE-2018-2795.json modified: 2018/2xxx/CVE-2018-2796.json modified: 2018/2xxx/CVE-2018-2797.json modified: 2018/2xxx/CVE-2018-2798.json modified: 2018/2xxx/CVE-2018-2799.json modified: 2018/2xxx/CVE-2018-2800.json modified: 2018/2xxx/CVE-2018-2801.json modified: 2018/2xxx/CVE-2018-2802.json modified: 2018/2xxx/CVE-2018-2803.json modified: 2018/2xxx/CVE-2018-2804.json modified: 2018/2xxx/CVE-2018-2805.json modified: 2018/2xxx/CVE-2018-2806.json modified: 2018/2xxx/CVE-2018-2807.json modified: 2018/2xxx/CVE-2018-2808.json modified: 2018/2xxx/CVE-2018-2809.json modified: 2018/2xxx/CVE-2018-2810.json modified: 2018/2xxx/CVE-2018-2811.json modified: 2018/2xxx/CVE-2018-2812.json modified: 2018/2xxx/CVE-2018-2813.json modified: 2018/2xxx/CVE-2018-2814.json modified: 2018/2xxx/CVE-2018-2815.json modified: 2018/2xxx/CVE-2018-2816.json modified: 2018/2xxx/CVE-2018-2817.json modified: 2018/2xxx/CVE-2018-2818.json modified: 2018/2xxx/CVE-2018-2819.json modified: 2018/2xxx/CVE-2018-2820.json modified: 2018/2xxx/CVE-2018-2821.json modified: 2018/2xxx/CVE-2018-2822.json modified: 2018/2xxx/CVE-2018-2823.json modified: 2018/2xxx/CVE-2018-2824.json modified: 2018/2xxx/CVE-2018-2825.json modified: 2018/2xxx/CVE-2018-2826.json modified: 2018/2xxx/CVE-2018-2827.json modified: 2018/2xxx/CVE-2018-2828.json modified: 2018/2xxx/CVE-2018-2829.json modified: 2018/2xxx/CVE-2018-2830.json modified: 2018/2xxx/CVE-2018-2831.json modified: 2018/2xxx/CVE-2018-2832.json modified: 2018/2xxx/CVE-2018-2833.json modified: 2018/2xxx/CVE-2018-2834.json modified: 2018/2xxx/CVE-2018-2835.json modified: 2018/2xxx/CVE-2018-2836.json modified: 2018/2xxx/CVE-2018-2837.json modified: 2018/2xxx/CVE-2018-2838.json modified: 2018/2xxx/CVE-2018-2839.json modified: 2018/2xxx/CVE-2018-2840.json modified: 2018/2xxx/CVE-2018-2841.json modified: 2018/2xxx/CVE-2018-2842.json modified: 2018/2xxx/CVE-2018-2843.json modified: 2018/2xxx/CVE-2018-2844.json modified: 2018/2xxx/CVE-2018-2845.json modified: 2018/2xxx/CVE-2018-2846.json modified: 2018/2xxx/CVE-2018-2847.json modified: 2018/2xxx/CVE-2018-2848.json modified: 2018/2xxx/CVE-2018-2849.json modified: 2018/2xxx/CVE-2018-2850.json modified: 2018/2xxx/CVE-2018-2851.json modified: 2018/2xxx/CVE-2018-2852.json modified: 2018/2xxx/CVE-2018-2853.json modified: 2018/2xxx/CVE-2018-2854.json modified: 2018/2xxx/CVE-2018-2855.json modified: 2018/2xxx/CVE-2018-2856.json modified: 2018/2xxx/CVE-2018-2857.json modified: 2018/2xxx/CVE-2018-2858.json modified: 2018/2xxx/CVE-2018-2859.json modified: 2018/2xxx/CVE-2018-2860.json modified: 2018/2xxx/CVE-2018-2861.json modified: 2018/2xxx/CVE-2018-2862.json modified: 2018/2xxx/CVE-2018-2863.json modified: 2018/2xxx/CVE-2018-2864.json modified: 2018/2xxx/CVE-2018-2865.json modified: 2018/2xxx/CVE-2018-2866.json modified: 2018/2xxx/CVE-2018-2867.json modified: 2018/2xxx/CVE-2018-2868.json modified: 2018/2xxx/CVE-2018-2869.json modified: 2018/2xxx/CVE-2018-2870.json modified: 2018/2xxx/CVE-2018-2871.json modified: 2018/2xxx/CVE-2018-2872.json modified: 2018/2xxx/CVE-2018-2873.json modified: 2018/2xxx/CVE-2018-2874.json modified: 2018/2xxx/CVE-2018-2876.json modified: 2018/2xxx/CVE-2018-2877.json modified: 2018/2xxx/CVE-2018-2878.json modified: 2018/2xxx/CVE-2018-2879.json modified: 2018/7xxx/CVE-2018-7489.json
2018-04-17 15:58:30 -07:00
{
2019-03-18 04:16:09 +00:00
"lang": "eng",
"value": "Vulnerability in the Hardware Management Pack component of Oracle Sun Systems Products Suite (subcomponent: Ipmitool). The supported version that is affected is Prior to 2.4.3. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hardware Management Pack. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hardware Management Pack accessible data as well as unauthorized read access to a subset of Hardware Management Pack accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)."
Committer: Bill Situ <Bill.Situ@Oracle.com> On branch cna/oracle/OracleCPUApr2018 Changes to be committed: modified: 2013/1xxx/CVE-2013-1768.json modified: 2014/0xxx/CVE-2014-0054.json modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/2xxx/CVE-2016-2177.json modified: 2016/2xxx/CVE-2016-2178.json modified: 2016/2xxx/CVE-2016-2179.json modified: 2016/2xxx/CVE-2016-2180.json modified: 2016/2xxx/CVE-2016-2181.json modified: 2016/2xxx/CVE-2016-2182.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/3xxx/CVE-2016-3506.json modified: 2016/5xxx/CVE-2016-5007.json modified: 2016/5xxx/CVE-2016-5019.json modified: 2016/6xxx/CVE-2016-6302.json modified: 2016/6xxx/CVE-2016-6303.json modified: 2016/6xxx/CVE-2016-6304.json modified: 2016/6xxx/CVE-2016-6305.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6307.json modified: 2016/6xxx/CVE-2016-6308.json modified: 2016/6xxx/CVE-2016-6309.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/7xxx/CVE-2016-7052.json modified: 2016/8xxx/CVE-2016-8745.json modified: 2016/9xxx/CVE-2016-9878.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/13xxx/CVE-2017-13077.json modified: 2017/13xxx/CVE-2017-13078.json modified: 2017/13xxx/CVE-2017-13080.json modified: 2017/13xxx/CVE-2017-13082.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/15xxx/CVE-2017-15707.json modified: 2017/17xxx/CVE-2017-17562.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3737.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5753.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7674.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/2xxx/CVE-2018-2563.json modified: 2018/2xxx/CVE-2018-2572.json modified: 2018/2xxx/CVE-2018-2587.json modified: 2018/2xxx/CVE-2018-2628.json modified: 2018/2xxx/CVE-2018-2718.json modified: 2018/2xxx/CVE-2018-2737.json modified: 2018/2xxx/CVE-2018-2738.json modified: 2018/2xxx/CVE-2018-2739.json modified: 2018/2xxx/CVE-2018-2742.json modified: 2018/2xxx/CVE-2018-2746.json modified: 2018/2xxx/CVE-2018-2747.json modified: 2018/2xxx/CVE-2018-2748.json modified: 2018/2xxx/CVE-2018-2749.json modified: 2018/2xxx/CVE-2018-2750.json modified: 2018/2xxx/CVE-2018-2752.json modified: 2018/2xxx/CVE-2018-2753.json modified: 2018/2xxx/CVE-2018-2754.json modified: 2018/2xxx/CVE-2018-2755.json modified: 2018/2xxx/CVE-2018-2756.json modified: 2018/2xxx/CVE-2018-2758.json modified: 2018/2xxx/CVE-2018-2759.json modified: 2018/2xxx/CVE-2018-2760.json modified: 2018/2xxx/CVE-2018-2761.json modified: 2018/2xxx/CVE-2018-2762.json modified: 2018/2xxx/CVE-2018-2763.json modified: 2018/2xxx/CVE-2018-2764.json modified: 2018/2xxx/CVE-2018-2765.json modified: 2018/2xxx/CVE-2018-2766.json modified: 2018/2xxx/CVE-2018-2768.json modified: 2018/2xxx/CVE-2018-2769.json modified: 2018/2xxx/CVE-2018-2770.json modified: 2018/2xxx/CVE-2018-2771.json modified: 2018/2xxx/CVE-2018-2772.json modified: 2018/2xxx/CVE-2018-2773.json modified: 2018/2xxx/CVE-2018-2774.json modified: 2018/2xxx/CVE-2018-2775.json modified: 2018/2xxx/CVE-2018-2776.json modified: 2018/2xxx/CVE-2018-2777.json modified: 2018/2xxx/CVE-2018-2778.json modified: 2018/2xxx/CVE-2018-2779.json modified: 2018/2xxx/CVE-2018-2780.json modified: 2018/2xxx/CVE-2018-2781.json modified: 2018/2xxx/CVE-2018-2782.json modified: 2018/2xxx/CVE-2018-2783.json modified: 2018/2xxx/CVE-2018-2784.json modified: 2018/2xxx/CVE-2018-2785.json modified: 2018/2xxx/CVE-2018-2786.json modified: 2018/2xxx/CVE-2018-2787.json modified: 2018/2xxx/CVE-2018-2788.json modified: 2018/2xxx/CVE-2018-2789.json modified: 2018/2xxx/CVE-2018-2790.json modified: 2018/2xxx/CVE-2018-2791.json modified: 2018/2xxx/CVE-2018-2792.json modified: 2018/2xxx/CVE-2018-2793.json modified: 2018/2xxx/CVE-2018-2794.json modified: 2018/2xxx/CVE-2018-2795.json modified: 2018/2xxx/CVE-2018-2796.json modified: 2018/2xxx/CVE-2018-2797.json modified: 2018/2xxx/CVE-2018-2798.json modified: 2018/2xxx/CVE-2018-2799.json modified: 2018/2xxx/CVE-2018-2800.json modified: 2018/2xxx/CVE-2018-2801.json modified: 2018/2xxx/CVE-2018-2802.json modified: 2018/2xxx/CVE-2018-2803.json modified: 2018/2xxx/CVE-2018-2804.json modified: 2018/2xxx/CVE-2018-2805.json modified: 2018/2xxx/CVE-2018-2806.json modified: 2018/2xxx/CVE-2018-2807.json modified: 2018/2xxx/CVE-2018-2808.json modified: 2018/2xxx/CVE-2018-2809.json modified: 2018/2xxx/CVE-2018-2810.json modified: 2018/2xxx/CVE-2018-2811.json modified: 2018/2xxx/CVE-2018-2812.json modified: 2018/2xxx/CVE-2018-2813.json modified: 2018/2xxx/CVE-2018-2814.json modified: 2018/2xxx/CVE-2018-2815.json modified: 2018/2xxx/CVE-2018-2816.json modified: 2018/2xxx/CVE-2018-2817.json modified: 2018/2xxx/CVE-2018-2818.json modified: 2018/2xxx/CVE-2018-2819.json modified: 2018/2xxx/CVE-2018-2820.json modified: 2018/2xxx/CVE-2018-2821.json modified: 2018/2xxx/CVE-2018-2822.json modified: 2018/2xxx/CVE-2018-2823.json modified: 2018/2xxx/CVE-2018-2824.json modified: 2018/2xxx/CVE-2018-2825.json modified: 2018/2xxx/CVE-2018-2826.json modified: 2018/2xxx/CVE-2018-2827.json modified: 2018/2xxx/CVE-2018-2828.json modified: 2018/2xxx/CVE-2018-2829.json modified: 2018/2xxx/CVE-2018-2830.json modified: 2018/2xxx/CVE-2018-2831.json modified: 2018/2xxx/CVE-2018-2832.json modified: 2018/2xxx/CVE-2018-2833.json modified: 2018/2xxx/CVE-2018-2834.json modified: 2018/2xxx/CVE-2018-2835.json modified: 2018/2xxx/CVE-2018-2836.json modified: 2018/2xxx/CVE-2018-2837.json modified: 2018/2xxx/CVE-2018-2838.json modified: 2018/2xxx/CVE-2018-2839.json modified: 2018/2xxx/CVE-2018-2840.json modified: 2018/2xxx/CVE-2018-2841.json modified: 2018/2xxx/CVE-2018-2842.json modified: 2018/2xxx/CVE-2018-2843.json modified: 2018/2xxx/CVE-2018-2844.json modified: 2018/2xxx/CVE-2018-2845.json modified: 2018/2xxx/CVE-2018-2846.json modified: 2018/2xxx/CVE-2018-2847.json modified: 2018/2xxx/CVE-2018-2848.json modified: 2018/2xxx/CVE-2018-2849.json modified: 2018/2xxx/CVE-2018-2850.json modified: 2018/2xxx/CVE-2018-2851.json modified: 2018/2xxx/CVE-2018-2852.json modified: 2018/2xxx/CVE-2018-2853.json modified: 2018/2xxx/CVE-2018-2854.json modified: 2018/2xxx/CVE-2018-2855.json modified: 2018/2xxx/CVE-2018-2856.json modified: 2018/2xxx/CVE-2018-2857.json modified: 2018/2xxx/CVE-2018-2858.json modified: 2018/2xxx/CVE-2018-2859.json modified: 2018/2xxx/CVE-2018-2860.json modified: 2018/2xxx/CVE-2018-2861.json modified: 2018/2xxx/CVE-2018-2862.json modified: 2018/2xxx/CVE-2018-2863.json modified: 2018/2xxx/CVE-2018-2864.json modified: 2018/2xxx/CVE-2018-2865.json modified: 2018/2xxx/CVE-2018-2866.json modified: 2018/2xxx/CVE-2018-2867.json modified: 2018/2xxx/CVE-2018-2868.json modified: 2018/2xxx/CVE-2018-2869.json modified: 2018/2xxx/CVE-2018-2870.json modified: 2018/2xxx/CVE-2018-2871.json modified: 2018/2xxx/CVE-2018-2872.json modified: 2018/2xxx/CVE-2018-2873.json modified: 2018/2xxx/CVE-2018-2874.json modified: 2018/2xxx/CVE-2018-2876.json modified: 2018/2xxx/CVE-2018-2877.json modified: 2018/2xxx/CVE-2018-2878.json modified: 2018/2xxx/CVE-2018-2879.json modified: 2018/7xxx/CVE-2018-7489.json
2018-04-17 15:58:30 -07:00
}
2019-03-18 04:16:09 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hardware Management Pack. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hardware Management Pack accessible data as well as unauthorized read access to a subset of Hardware Management Pack accessible data."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1040702",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040702"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name": "103889",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103889"
}
]
}
}