From 2f708b0d4b9f4fd2a827834406b499d2ce9f74df Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 22 Sep 2018 12:06:23 -0400 Subject: [PATCH] - Synchronized data. --- 2018/17xxx/CVE-2018-17153.json | 7 +++- 2018/17xxx/CVE-2018-17332.json | 48 ++++++++++++++++++++++++-- 2018/17xxx/CVE-2018-17333.json | 48 ++++++++++++++++++++++++-- 2018/17xxx/CVE-2018-17334.json | 48 ++++++++++++++++++++++++-- 2018/17xxx/CVE-2018-17335.json | 18 ++++++++++ 2018/17xxx/CVE-2018-17336.json | 62 ++++++++++++++++++++++++++++++++++ 6 files changed, 224 insertions(+), 7 deletions(-) create mode 100644 2018/17xxx/CVE-2018-17335.json create mode 100644 2018/17xxx/CVE-2018-17336.json diff --git a/2018/17xxx/CVE-2018-17153.json b/2018/17xxx/CVE-2018-17153.json index ab582a8c291..f3383013d26 100644 --- a/2018/17xxx/CVE-2018-17153.json +++ b/2018/17xxx/CVE-2018-17153.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "It was discovered that the Western Digital My Cloud device through 2.30.x is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called \"cgi_get_ipv6\" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter \"flag\" with the value \"1\" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie." + "value" : "It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called \"cgi_get_ipv6\" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter \"flag\" with the value \"1\" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie." } ] }, @@ -57,6 +57,11 @@ "refsource" : "MISC", "url" : "https://securify.nl/nl/advisory/SFY20180102/authentication-bypass-vulnerability-in-western-digital-my-cloud-allows-escalation-to-admin-privileges.html" }, + { + "name" : "https://support.wdc.com/knowledgebase/answer.aspx?ID=25952", + "refsource" : "MISC", + "url" : "https://support.wdc.com/knowledgebase/answer.aspx?ID=25952" + }, { "name" : "105359", "refsource" : "BID", diff --git a/2018/17xxx/CVE-2018-17332.json b/2018/17xxx/CVE-2018-17332.json index e1067dbda0a..e2d161d3b01 100644 --- a/2018/17xxx/CVE-2018-17332.json +++ b/2018/17xxx/CVE-2018-17332.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-17332", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in libsvg2 through 2012-10-19. The svgGetNextPathField function in svg_string.c returns its input pointer in certain circumstances, which might result in a memory leak caused by wasteful malloc calls." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/agambier/libsvg2/issues/2", + "refsource" : "MISC", + "url" : "https://github.com/agambier/libsvg2/issues/2" } ] } diff --git a/2018/17xxx/CVE-2018-17333.json b/2018/17xxx/CVE-2018-17333.json index e40afbb2c1a..ae36cb71aef 100644 --- a/2018/17xxx/CVE-2018-17333.json +++ b/2018/17xxx/CVE-2018-17333.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-17333", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in libsvg2 through 2012-10-19. A stack-based buffer overflow in svgStringToLength in svg_types.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because sscanf is misused." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/agambier/libsvg2/issues/4", + "refsource" : "MISC", + "url" : "https://github.com/agambier/libsvg2/issues/4" } ] } diff --git a/2018/17xxx/CVE-2018-17334.json b/2018/17xxx/CVE-2018-17334.json index 98bbbb6c63a..c1c09cffba9 100644 --- a/2018/17xxx/CVE-2018-17334.json +++ b/2018/17xxx/CVE-2018-17334.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-17334", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in libsvg2 through 2012-10-19. A stack-based buffer overflow in the svgGetNextPathField function in svg_string.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because a strncpy copy limit is miscalculated." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/agambier/libsvg2/issues/3", + "refsource" : "MISC", + "url" : "https://github.com/agambier/libsvg2/issues/3" } ] } diff --git a/2018/17xxx/CVE-2018-17335.json b/2018/17xxx/CVE-2018-17335.json new file mode 100644 index 00000000000..f720ad301d7 --- /dev/null +++ b/2018/17xxx/CVE-2018-17335.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-17335", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/17xxx/CVE-2018-17336.json b/2018/17xxx/CVE-2018-17336.json new file mode 100644 index 00000000000..41c0a27cd97 --- /dev/null +++ b/2018/17xxx/CVE-2018-17336.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-17336", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "UDisks 2.8.0 has a format string vulnerability in udisks_log in udiskslogging.c, allowing attackers to obtain sensitive information (stack contents), cause a denial of service (memory corruption), or possibly have unspecified other impact via a malformed filesystem label, as demonstrated by %d or %n substrings." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/storaged-project/udisks/issues/578", + "refsource" : "MISC", + "url" : "https://github.com/storaged-project/udisks/issues/578" + } + ] + } +}