cvelist/2018/0xxx/CVE-2018-0743.json

88 lines
3.1 KiB
JSON
Raw Normal View History

2017-12-01 14:03:40 -05:00
{
2019-03-18 04:54:14 +00:00
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"DATE_PUBLIC": "2018-01-03T00:00:00",
"ID": "CVE-2018-0743",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows Subsystem for Linux",
"version": {
"version_data": [
{
"version_value": "Windows 10 version 1703, Windows 10 version1709, and Windows Server, version 1709"
}
]
}
}
]
},
"vendor_name": "Microsoft Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
2019-03-18 04:54:14 +00:00
"lang": "eng",
"value": "Windows Subsystem for Linux in Windows 10 version 1703, Windows 10 version 1709, and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka \"Windows Subsystem for Linux Elevation of Privilege Vulnerability\"."
}
2019-03-18 04:54:14 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1040094",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040094"
},
{
"name": "https://github.com/saaramar/execve_exploit",
"refsource": "MISC",
"url": "https://github.com/saaramar/execve_exploit"
},
{
"name": "https://twitter.com/AmarSaar/status/948892321755598848",
"refsource": "MISC",
"url": "https://twitter.com/AmarSaar/status/948892321755598848"
},
{
"name": "43962",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43962/"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0743",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0743"
},
{
"name": "102350",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102350"
}
]
}
}