- Synchronized data.

This commit is contained in:
CVE Team 2018-12-05 13:04:44 -05:00
parent 6fbbffd0fa
commit 2555f48282
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 98 additions and 96 deletions

View File

@ -1,73 +1,74 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2018-12-03T18:00:00.000Z", "DATE_PUBLIC" : "2018-12-03T18:00:00.000Z",
"ID": "CVE-2018-15773", "ID" : "CVE-2018-15773",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Dell Encryption Enterprise \\ Dell Data Protection Encryption Information Disclosure Vulnerability" "TITLE" : "Dell Encryption Enterprise \\ Dell Data Protection Encryption Information Disclosure Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Dell Encryption (formerly Dell Data Protection | Encryption)", "product_name" : "Dell Encryption (formerly Dell Data Protection | Encryption)",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": "<", "affected" : "<",
"version_value": "10.1.0" "version_value" : "10.1.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Dell" "vendor_name" : "Dell"
} }
] ]
} }
}, },
"credit": [ "credit" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Dell would like to thank Jan van der Put and Harm Blankers of REQON Security for reporting this vulnerability." "value" : "Dell would like to thank Jan van der Put and Harm Blankers of REQON Security for reporting this vulnerability."
} }
], ],
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Dell Encryption (formerly Dell Data Protection | Encryption) v10.1.0 and earlier contain an information disclosure vulnerability. A malicious user with physical access to the machine could potentially exploit this vulnerability to access the unencrypted RegBack folder that contains back-ups of sensitive system files.\n\n" "value" : "Dell Encryption (formerly Dell Data Protection | Encryption) v10.1.0 and earlier contain an information disclosure vulnerability. A malicious user with physical access to the machine could potentially exploit this vulnerability to access the unencrypted RegBack folder that contains back-ups of sensitive system files."
} }
] ]
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "information disclosure vulnerability" "value" : "information disclosure vulnerability"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "https://www.dell.com/support/article/us/en/04/sln314963/dell-encryption-enterprise-dell-data-protection-encryption-information-disclosure-vulnerability?lang=en",
"url": "https://www.dell.com/support/article/us/en/04/sln314963/dell-encryption-enterprise-dell-data-protection-encryption-information-disclosure-vulnerability?lang=en" "refsource" : "MISC",
"url" : "https://www.dell.com/support/article/us/en/04/sln314963/dell-encryption-enterprise-dell-data-protection-encryption-information-disclosure-vulnerability?lang=en"
} }
] ]
}, },
"source": { "source" : {
"discovery": "UNKNOWN" "discovery" : "UNKNOWN"
} }
} }

View File

@ -1,94 +1,95 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2018-12-03T00:00:00.000Z", "DATE_PUBLIC" : "2018-12-03T00:00:00.000Z",
"ID": "CVE-2018-15797", "ID" : "CVE-2018-15797",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "NFS Volume release errand leaks cf admin credentials in logs" "TITLE" : "NFS Volume release errand leaks cf admin credentials in logs"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "NFS Volume Release", "product_name" : "NFS Volume Release",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": "<", "affected" : "<",
"version_name": "1.2", "version_name" : "1.2",
"version_value": "1.2.5" "version_value" : "1.2.5"
}, },
{ {
"affected": "<", "affected" : "<",
"version_name": "1.5", "version_name" : "1.5",
"version_value": "1.5.4" "version_value" : "1.5.4"
}, },
{ {
"affected": "<", "affected" : "<",
"version_name": "1.7", "version_name" : "1.7",
"version_value": "1.7.3" "version_value" : "1.7.3"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Cloud Foundry" "vendor_name" : "Cloud Foundry"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand." "value" : "Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "LOW", "attackComplexity" : "LOW",
"attackVector": "ADJACENT_NETWORK", "attackVector" : "ADJACENT_NETWORK",
"availabilityImpact": "HIGH", "availabilityImpact" : "HIGH",
"baseScore": 8.4, "baseScore" : 8.4,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "HIGH", "privilegesRequired" : "HIGH",
"scope": "CHANGED", "scope" : "CHANGED",
"userInteraction": "NONE", "userInteraction" : "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "vectorString" : "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Information Exposure Through Debug Information" "value" : "Information Exposure Through Debug Information"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "https://www.cloudfoundry.org/blog/cve-2018-15797",
"url": "https://www.cloudfoundry.org/blog/cve-2018-15797" "refsource" : "CONFIRM",
"url" : "https://www.cloudfoundry.org/blog/cve-2018-15797"
} }
] ]
}, },
"source": { "source" : {
"discovery": "UNKNOWN" "discovery" : "UNKNOWN"
} }
} }