From 721c855a740f630eda476e0d9c6b9f1d0b002a03 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 13 Dec 2018 18:09:58 -0500 Subject: [PATCH] - Synchronized data. --- 2018/12xxx/CVE-2018-12206.json | 2 + 2018/18xxx/CVE-2018-18093.json | 2 + 2018/18xxx/CVE-2018-18096.json | 2 + 2018/18xxx/CVE-2018-18097.json | 2 + 2018/3xxx/CVE-2018-3704.json | 2 + 2018/3xxx/CVE-2018-3705.json | 2 + 2018/6xxx/CVE-2018-6707.json | 112 ++++++++++++++++----------------- 7 files changed, 68 insertions(+), 56 deletions(-) diff --git a/2018/12xxx/CVE-2018-12206.json b/2018/12xxx/CVE-2018-12206.json index 1fa06dc5c5a..32d0b6e3251 100644 --- a/2018/12xxx/CVE-2018-12206.json +++ b/2018/12xxx/CVE-2018-12206.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html", + "refsource" : "CONFIRM", "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html" } ] diff --git a/2018/18xxx/CVE-2018-18093.json b/2018/18xxx/CVE-2018-18093.json index 74a692e1df9..636b771dc30 100644 --- a/2018/18xxx/CVE-2018-18093.json +++ b/2018/18xxx/CVE-2018-18093.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00194.html", + "refsource" : "CONFIRM", "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00194.html" } ] diff --git a/2018/18xxx/CVE-2018-18096.json b/2018/18xxx/CVE-2018-18096.json index bc1af836b02..b1cb0207c7f 100644 --- a/2018/18xxx/CVE-2018-18096.json +++ b/2018/18xxx/CVE-2018-18096.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html", + "refsource" : "CONFIRM", "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html" } ] diff --git a/2018/18xxx/CVE-2018-18097.json b/2018/18xxx/CVE-2018-18097.json index c757872509b..5a5816234d5 100644 --- a/2018/18xxx/CVE-2018-18097.json +++ b/2018/18xxx/CVE-2018-18097.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00205.html", + "refsource" : "CONFIRM", "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00205.html" } ] diff --git a/2018/3xxx/CVE-2018-3704.json b/2018/3xxx/CVE-2018-3704.json index ec86551ee4f..11162e131d5 100644 --- a/2018/3xxx/CVE-2018-3704.json +++ b/2018/3xxx/CVE-2018-3704.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00208.html", + "refsource" : "CONFIRM", "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00208.html" } ] diff --git a/2018/3xxx/CVE-2018-3705.json b/2018/3xxx/CVE-2018-3705.json index 3fbfe319362..2403f09677d 100644 --- a/2018/3xxx/CVE-2018-3705.json +++ b/2018/3xxx/CVE-2018-3705.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00209.html", + "refsource" : "CONFIRM", "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00209.html" } ] diff --git a/2018/6xxx/CVE-2018-6707.json b/2018/6xxx/CVE-2018-6707.json index 292cb335311..ca333c59c5d 100644 --- a/2018/6xxx/CVE-2018-6707.json +++ b/2018/6xxx/CVE-2018-6707.json @@ -1,100 +1,100 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@mcafee.com", - "ID": "CVE-2018-6707", - "STATE": "PUBLIC", - "TITLE": "McAfee Agent Insecure usage of temporary files vulnerability" + "CVE_data_meta" : { + "ASSIGNER" : "psirt@mcafee.com", + "ID" : "CVE-2018-6707", + "STATE" : "PUBLIC", + "TITLE" : "McAfee Agent Insecure usage of temporary files vulnerability" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "McAfee Agent (MA) non-Windows non-Windows versions ", - "version": { - "version_data": [ + "product_name" : "McAfee Agent (MA) non-Windows non-Windows versions ", + "version" : { + "version_data" : [ { - "affected": ">=", - "platform": "x86", - "version_name": "5.0.0", - "version_value": "5.0.0" + "affected" : ">=", + "platform" : "x86", + "version_name" : "5.0.0", + "version_value" : "5.0.0" }, { - "affected": "<=", - "platform": "x86", - "version_name": "5.0.6", - "version_value": "5.0.6" + "affected" : "<=", + "platform" : "x86", + "version_name" : "5.0.6", + "version_value" : "5.0.6" }, { - "affected": "=", - "platform": "x86", - "version_name": "5.5.0", - "version_value": "5.5.0" + "affected" : "=", + "platform" : "x86", + "version_name" : "5.5.0", + "version_value" : "5.5.0" }, { - "affected": "=", - "platform": "x86", - "version_name": "5.5.1", - "version_value": "5.5.1" + "affected" : "=", + "platform" : "x86", + "version_name" : "5.5.1", + "version_value" : "5.5.1" } ] } } ] }, - "vendor_name": "McAfee" + "vendor_name" : "McAfee" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "McAfee credits Brandon Vincent for discovery of this vulnerability." + "lang" : "eng", + "value" : "McAfee credits Brandon Vincent for discovery of this vulnerability." } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism." + "lang" : "eng", + "value" : "Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Denial of Service" + "lang" : "eng", + "value" : "Denial of Service" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10260", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10260" + "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10260", + "refsource" : "CONFIRM", + "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10260" } ] }, - "solution": [ + "solution" : [ { - "lang": "eng", - "value": "upgrade to McAfee Agent 5.6.0" + "lang" : "eng", + "value" : "upgrade to McAfee Agent 5.6.0" } ], - "source": { - "advisory": "SB10260", - "discovery": "EXTERNAL" + "source" : { + "advisory" : "SB10260", + "discovery" : "EXTERNAL" } }