- Synchronized data.

This commit is contained in:
CVE Team 2018-12-10 14:05:21 -05:00
parent 16a1277bca
commit 007c872192
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 104 additions and 102 deletions

View File

@ -1,84 +1,85 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2018-12-06T00:00:00.000Z", "DATE_PUBLIC" : "2018-12-06T00:00:00.000Z",
"ID": "CVE-2018-15800", "ID" : "CVE-2018-15800",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Timing attack allows extraction of signing key in Bits Service" "TITLE" : "Timing attack allows extraction of signing key in Bits Service"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Bits Service Release", "product_name" : "Bits Service Release",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": "<", "affected" : "<",
"version_name": "all versions", "version_name" : "all versions",
"version_value": "2.18.0" "version_value" : "2.18.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Cloud Foundry" "vendor_name" : "Cloud Foundry"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage." "value" : "Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "LOW", "attackComplexity" : "LOW",
"attackVector": "NETWORK", "attackVector" : "NETWORK",
"availabilityImpact": "NONE", "availabilityImpact" : "NONE",
"baseScore": 8.1, "baseScore" : 8.1,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "LOW", "privilegesRequired" : "LOW",
"scope": "UNCHANGED", "scope" : "UNCHANGED",
"userInteraction": "NONE", "userInteraction" : "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Brute Force" "value" : "Brute Force"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "https://www.cloudfoundry.org/blog/cve-2018-15800",
"url": "https://www.cloudfoundry.org/blog/cve-2018-15800" "refsource" : "CONFIRM",
"url" : "https://www.cloudfoundry.org/blog/cve-2018-15800"
} }
] ]
}, },
"source": { "source" : {
"discovery": "UNKNOWN" "discovery" : "UNKNOWN"
} }
} }

View File

@ -1,84 +1,85 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2018-12-05T00:00:00.000Z", "DATE_PUBLIC" : "2018-12-05T00:00:00.000Z",
"ID": "CVE-2018-1279", "ID" : "CVE-2018-1279",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "RabbitMQ cluster compromise due to deterministically generated cookie" "TITLE" : "RabbitMQ cluster compromise due to deterministically generated cookie"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "RabbitMq for PCF", "product_name" : "RabbitMq for PCF",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": ">", "affected" : ">",
"version_name": "all versions", "version_name" : "all versions",
"version_value": "1" "version_value" : "1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Pivotal" "vendor_name" : "Pivotal"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the MQ cluster can use this cookie to gain full control over the entire cluster." "value" : "Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the MQ cluster can use this cookie to gain full control over the entire cluster."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "HIGH", "attackComplexity" : "HIGH",
"attackVector": "NETWORK", "attackVector" : "NETWORK",
"availabilityImpact": "HIGH", "availabilityImpact" : "HIGH",
"baseScore": 8.5, "baseScore" : 8.5,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "LOW", "privilegesRequired" : "LOW",
"scope": "CHANGED", "scope" : "CHANGED",
"userInteraction": "NONE", "userInteraction" : "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "vectorString" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Use of Insufficiently Random Values" "value" : "Use of Insufficiently Random Values"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "https://pivotal.io/security/cve-2018-1279",
"url": "https://pivotal.io/security/cve-2018-1279" "refsource" : "CONFIRM",
"url" : "https://pivotal.io/security/cve-2018-1279"
} }
] ]
}, },
"source": { "source" : {
"discovery": "UNKNOWN" "discovery" : "UNKNOWN"
} }
} }