"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-06-15 08:00:42 +00:00
parent c657397116
commit 2ff7350b9c
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
3 changed files with 166 additions and 8 deletions

View File

@ -1,17 +1,175 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-2847",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@eset.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\n\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\n\n\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-269 Improper Privilege Management",
"cweId": "CWE-269"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ESET",
"product": {
"product_data": [
{
"product_name": "Server Security for Linux",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "9.1.98.0"
},
{
"status": "unaffected",
"version": "9.0.466.0"
},
{
"status": "unaffected",
"version": "8.1.823.0"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Endpoint Antivirus for Linux",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "9.1.11.0"
},
{
"status": "unaffected",
"version": "9.0.10.0"
},
{
"status": "unaffected",
"version": "8.1.12.0"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
},
{
"vendor_name": "ESET ",
"product": {
"product_data": [
{
"product_name": "Cyber Security",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "7.3.3700.0"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Endpoint Antivirus for macOS",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "7.3.3600.0"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.eset.com/en/ca8447",
"refsource": "MISC",
"name": "https://support.eset.com/en/ca8447"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "INTERNAL"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -21,8 +21,8 @@
"description": [
{
"lang": "eng",
"value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')",
"cweId": "CWE-74"
"value": "CWE-131 Incorrect Calculation of Buffer Size",
"cweId": "CWE-131"
}
]
}

View File

@ -21,8 +21,8 @@
"description": [
{
"lang": "eng",
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
"value": "CWE-522 Insufficiently Protected Credentials",
"cweId": "CWE-522"
}
]
}