- Synchronized data.

This commit is contained in:
CVE Team 2018-09-27 19:04:00 -04:00
parent d81540bd98
commit 3aa1acbbfe
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8

View File

@ -1,90 +1,90 @@
{
"CVE_data_meta": {
"ASSIGNER": "securityalerts@avaya.com",
"DATE_PUBLIC": "2018-09-27T06:00:00.000Z",
"ID": "CVE-2018-15611",
"STATE": "PUBLIC",
"TITLE": "Communication Manager Local Administrator PrivEsc"
"CVE_data_meta" : {
"ASSIGNER" : "securityalerts@avaya.com",
"DATE_PUBLIC" : "2018-09-27T06:00:00.000Z",
"ID" : "CVE-2018-15611",
"STATE" : "PUBLIC",
"TITLE" : "Communication Manager Local Administrator PrivEsc"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Communication Manager",
"version": {
"version_data": [
"product_name" : "Communication Manager",
"version" : {
"version_data" : [
{
"affected": "<=7.1.3.1",
"version_name": "7.x",
"version_value": "7.1.3.1"
"affected" : "<=7.1.3.1",
"version_name" : "7.x",
"version_value" : "7.1.3.1"
},
{
"affected": "=6.3.x",
"version_name": "6.3.x",
"version_value": "6.3.x"
"affected" : "=6.3.x",
"version_name" : "6.3.x",
"version_value" : "6.3.x"
}
]
}
}
]
},
"vendor_name": "Avaya"
"vendor_name" : "Avaya"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "A vulnerability in the local system administration component of Avaya Aura Communication Manager can allow an authenticated, privileged user on the local system to gain root privileges. Affected versions include 6.3.x and all 7.x version prior to 7.1.3.1."
"lang" : "eng",
"value" : "A vulnerability in the local system administration component of Avaya Aura Communication Manager can allow an authenticated, privileged user on the local system to gain root privileges. Affected versions include 6.3.x and all 7.x version prior to 7.1.3.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH",
"attackVector" : "LOCAL",
"availabilityImpact" : "HIGH",
"baseScore" : 6.3,
"baseSeverity" : "MEDIUM",
"confidentialityImpact" : "HIGH",
"integrityImpact" : "HIGH",
"privilegesRequired" : "HIGH",
"scope" : "UNCHANGED",
"userInteraction" : "REQUIRED",
"vectorString" : "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version" : "3.0"
}
},
"problemtype": {
"problemtype_data": [
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "CWE-284: Improper Access Control"
"lang" : "eng",
"value" : "CWE-284: Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"name": "https://downloads.avaya.com/css/P8/documents/101052550",
"refsource": "CONFIRM",
"url": "https://downloads.avaya.com/css/P8/documents/101052550"
"name" : "https://downloads.avaya.com/css/P8/documents/101052550",
"refsource" : "CONFIRM",
"url" : "https://downloads.avaya.com/css/P8/documents/101052550"
}
]
},
"source": {
"advisory": "ASA-2017-343"
"source" : {
"advisory" : "ASA-2017-343"
}
}