From 743a9e613ba5a405e83e4009e290c64ec542325a Mon Sep 17 00:00:00 2001 From: lenpsirt Date: Thu, 8 Aug 2019 16:38:18 -0400 Subject: [PATCH 1/2] Lenovo_8-8-19_CVEs CVE submission --- 2019/6xxx/CVE-2019-6159.json | 107 ++++++++++++++++++++++++++++++----- 2019/6xxx/CVE-2019-6165.json | 107 ++++++++++++++++++++++++++++++----- 2019/6xxx/CVE-2019-6171.json | 107 ++++++++++++++++++++++++++++++----- 3 files changed, 276 insertions(+), 45 deletions(-) diff --git a/2019/6xxx/CVE-2019-6159.json b/2019/6xxx/CVE-2019-6159.json index ce24ebcaa2a..e9d50737ab5 100644 --- a/2019/6xxx/CVE-2019-6159.json +++ b/2019/6xxx/CVE-2019-6159.json @@ -1,18 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6159", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "psirt@lenovo.com", + "DATE_PUBLIC": "2019-08-08T20:00:00.000Z", + "ID": "CVE-2019-6159", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "legacy System x IMM", + "version": { + "version_data": [ + { + "affected": "=", + "version_value": "various" + } + ] + } + } + ] + }, + "vendor_name": "IBM" } - ] - } -} \ No newline at end of file + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Lenovo thanks Christopher Arnold for reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A stored cross-site scripting (XSS) vulnerability exists in various versions of the legacy IBM System x IMM (IMM v1) embedded Baseboard Management Controller (BMC). This vulnerability could allow an unauthenticated user to cause JavaScript code to be stored in the IMM log which may then be executed in the user's web browser when IMM log records containing the JavaScript code are viewed. The JavaScript code is not executed on IMM itself. The later IMM2 (IMM v2) is not affected." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "code execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://support.lenovo.com/solutions/LEN-24785" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "A patch will not be available for this vulnerability as IMM (IMM v1) is approaching end of support.\n\nTo mitigate this vulnerability, users should:\n\nRestrict network access of the IMM web interface to only trusted networks.\nView IMM logs through an SSH session or the IMM web interface after disabling JavaScript in the web browser.\nSend IMM logs to a log management system that does not render JavaScript." + } + ], + "source": { + "advisory": "LEN-24785", + "discovery": "UNKNOWN" + } +} diff --git a/2019/6xxx/CVE-2019-6165.json b/2019/6xxx/CVE-2019-6165.json index 2282fd87767..17acbb8fdf5 100644 --- a/2019/6xxx/CVE-2019-6165.json +++ b/2019/6xxx/CVE-2019-6165.json @@ -1,18 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6165", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "psirt@lenovo.com", + "DATE_PUBLIC": "2019-08-08T20:00:00.000Z", + "ID": "CVE-2019-6165", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "PaperDisplay Hotkey Service", + "version": { + "version_data": [ + { + "affected": "<=", + "version_value": "1.2.0.8" + } + ] + } + } + ] + }, + "vendor_name": "Lenovo" } - ] - } -} \ No newline at end of file + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Lenovo would like to thank Michael Bourque for reporting this issue. " + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A DLL search path vulnerability was reported in PaperDisplay Hotkey Service version 1.2.0.8 that could allow privilege escalation. Lenovo has ended support for PaperDisplay Hotkey software as the Night light feature introduced in Windows 10 Build 1703 provides similar features." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Privilege escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://support.lenovo.com/solutions/LEN-27569" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Lenovo is not releasing updates to mitigate this vulnerability and users should uninstall PaperDisplay Hotkey Service. The Night light feature in Windows 10 provides similar functionality of the PaperDisplay Hotkey Service." + } + ], + "source": { + "advisory": "LEN-27569", + "discovery": "UNKNOWN" + } +} diff --git a/2019/6xxx/CVE-2019-6171.json b/2019/6xxx/CVE-2019-6171.json index 5dba81e98f7..4340b1d057f 100644 --- a/2019/6xxx/CVE-2019-6171.json +++ b/2019/6xxx/CVE-2019-6171.json @@ -1,18 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6171", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta": { + "ASSIGNER": "psirt@lenovo.com", + "DATE_PUBLIC": "2019-08-08T20:00:00.000Z", + "ID": "CVE-2019-6171", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "product": { + "product_data": [ + { + "product_name": "ThinkPad", + "version": { + "version_data": [ + { + "affected": "=", + "version_value": "various" + } + ] + } + } + ] + }, + "vendor_name": "Lenovo" } - ] - } -} \ No newline at end of file + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Lenovo would like to thank Alex Matrosov and Alexandre Gazet for reporting this issue." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was reported in various older ThinkPad systems that could allow a user with administrative privileges or physical access the ability to update the Embedded Controller with unsigned firmware." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "PHYSICAL", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Privilege escalation" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://support.lenovo.com/solutions/LEN-27764" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Update to the version of BIOS (or later) described for your system in the Product Impact section of LEN-27764." + } + ], + "source": { + "advisory": "LEN-27764", + "discovery": "UNKNOWN" + } +} From 6cb686eb06b7fd69fd2367879a2facebc068368b Mon Sep 17 00:00:00 2001 From: lenpsirt Date: Fri, 16 Aug 2019 16:19:46 -0400 Subject: [PATCH 2/2] Updated details Clarified version details. Full version information will be found in public advisories. --- 2019/6xxx/CVE-2019-6159.json | 4 ++-- 2019/6xxx/CVE-2019-6171.json | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/2019/6xxx/CVE-2019-6159.json b/2019/6xxx/CVE-2019-6159.json index e9d50737ab5..268ce8253a4 100644 --- a/2019/6xxx/CVE-2019-6159.json +++ b/2019/6xxx/CVE-2019-6159.json @@ -12,7 +12,7 @@ "product": { "product_data": [ { - "product_name": "legacy System x IMM", + "product_name": "legacy System x IMM (IMM v1) firmware", "version": { "version_data": [ { @@ -42,7 +42,7 @@ "description_data": [ { "lang": "eng", - "value": "A stored cross-site scripting (XSS) vulnerability exists in various versions of the legacy IBM System x IMM (IMM v1) embedded Baseboard Management Controller (BMC). This vulnerability could allow an unauthenticated user to cause JavaScript code to be stored in the IMM log which may then be executed in the user's web browser when IMM log records containing the JavaScript code are viewed. The JavaScript code is not executed on IMM itself. The later IMM2 (IMM v2) is not affected." + "value": "A stored cross-site scripting (XSS) vulnerability exists in various firmware versions of the legacy IBM System x IMM (IMM v1) embedded Baseboard Management Controller (BMC). This vulnerability could allow an unauthenticated user to cause JavaScript code to be stored in the IMM log which may then be executed in the user's web browser when IMM log records containing the JavaScript code are viewed. The JavaScript code is not executed on IMM itself. The later IMM2 (IMM v2) is not affected." } ] }, diff --git a/2019/6xxx/CVE-2019-6171.json b/2019/6xxx/CVE-2019-6171.json index 4340b1d057f..2765a6e33dd 100644 --- a/2019/6xxx/CVE-2019-6171.json +++ b/2019/6xxx/CVE-2019-6171.json @@ -12,7 +12,7 @@ "product": { "product_data": [ { - "product_name": "ThinkPad", + "product_name": "BIOS", "version": { "version_data": [ { @@ -42,7 +42,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability was reported in various older ThinkPad systems that could allow a user with administrative privileges or physical access the ability to update the Embedded Controller with unsigned firmware." + "value": "A vulnerability was reported in various BIOS versions of older ThinkPad systems that could allow a user with administrative privileges or physical access the ability to update the Embedded Controller with unsigned firmware." } ] },