"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-11 20:00:57 +00:00
parent c29a244215
commit 135c33c42c
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
17 changed files with 152 additions and 39 deletions

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11769",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-11769",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in TeamViewer 14.2.2558. Updating the product as a non-administrative user requires entering administrative credentials into the GUI. Subsequently, these credentials are processed in Teamviewer.exe, which allows any application running in the same non-administrative user context to intercept them in cleartext within process memory. By using this technique, a local attacker is able to obtain administrative credentials in order to elevate privileges. This vulnerability can be exploited by injecting code into Teamviewer.exe which intercepts calls to GetWindowTextW and logs the processed credentials."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?type=label&labels=Security",
"refsource": "MISC",
"name": "https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?type=label&labels=Security"
},
{
"refsource": "MISC",
"name": "https://blog.to.com/advisory-teamviewer-cve-2019-11769-2/",
"url": "https://blog.to.com/advisory-teamviewer-cve-2019-11769-2/"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "GENTOO",
"name": "GLSA-201909-02",
"url": "https://security.gentoo.org/glsa/201909-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4131-1",
"url": "https://usn.ubuntu.com/4131-1/"
}
]
}

View File

@ -1,11 +1,11 @@
{
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2019-09-10",
"ID": "CVE-2019-1547",
"STATE": "PUBLIC",
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2019-09-10",
"ID": "CVE-2019-1547",
"STATE": "PUBLIC",
"TITLE": "ECDSA remote timing attack"
},
},
"affects": {
"vendor": {
"vendor_data": [
@ -13,15 +13,15 @@
"product": {
"product_data": [
{
"product_name": "OpenSSL",
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value": "Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c)"
},
},
{
"version_value": "Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k)"
},
},
{
"version_value": "Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s)"
}
@ -29,69 +29,74 @@
}
}
]
},
},
"vendor_name": "OpenSSL"
}
]
}
},
},
"credit": [
{
"lang": "eng",
"lang": "eng",
"value": "Cesar Pereida Garc\u00eda, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"lang": "eng",
"value": "Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s)."
}
]
},
},
"impact": [
{
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"lang": "eng",
"value": "Timing side channel"
}
]
}
]
},
},
"references": {
"reference_data": [
{
"name": "https://www.openssl.org/news/secadv/20190910.txt",
"refsource": "CONFIRM",
"name": "https://www.openssl.org/news/secadv/20190910.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20190910.txt"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46"
},
{
"refsource": "MISC",
"name": "https://arxiv.org/abs/1909.01785",
"url": "https://arxiv.org/abs/1909.01785"
}
]
}

View File

@ -98,6 +98,7 @@
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi",
"url": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi"
}
]

View File

@ -98,6 +98,7 @@
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi",
"url": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi"
}
]

View File

@ -98,6 +98,7 @@
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi",
"url": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi"
}
]

View File

@ -98,6 +98,7 @@
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi",
"url": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi"
}
]