mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
- Synchronized data.
This commit is contained in:
parent
86ba830bab
commit
721c855a74
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html"
|
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00194.html",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00194.html"
|
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00194.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html"
|
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00211.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00205.html",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00205.html"
|
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00205.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00208.html",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00208.html"
|
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00208.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -53,6 +53,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00209.html",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00209.html"
|
"url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00209.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -1,100 +1,100 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER": "psirt@mcafee.com",
|
"ASSIGNER" : "psirt@mcafee.com",
|
||||||
"ID": "CVE-2018-6707",
|
"ID" : "CVE-2018-6707",
|
||||||
"STATE": "PUBLIC",
|
"STATE" : "PUBLIC",
|
||||||
"TITLE": "McAfee Agent Insecure usage of temporary files vulnerability"
|
"TITLE" : "McAfee Agent Insecure usage of temporary files vulnerability"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects" : {
|
||||||
"vendor": {
|
"vendor" : {
|
||||||
"vendor_data": [
|
"vendor_data" : [
|
||||||
{
|
{
|
||||||
"product": {
|
"product" : {
|
||||||
"product_data": [
|
"product_data" : [
|
||||||
{
|
{
|
||||||
"product_name": "McAfee Agent (MA) non-Windows non-Windows versions ",
|
"product_name" : "McAfee Agent (MA) non-Windows non-Windows versions ",
|
||||||
"version": {
|
"version" : {
|
||||||
"version_data": [
|
"version_data" : [
|
||||||
{
|
{
|
||||||
"affected": ">=",
|
"affected" : ">=",
|
||||||
"platform": "x86",
|
"platform" : "x86",
|
||||||
"version_name": "5.0.0",
|
"version_name" : "5.0.0",
|
||||||
"version_value": "5.0.0"
|
"version_value" : "5.0.0"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"affected": "<=",
|
"affected" : "<=",
|
||||||
"platform": "x86",
|
"platform" : "x86",
|
||||||
"version_name": "5.0.6",
|
"version_name" : "5.0.6",
|
||||||
"version_value": "5.0.6"
|
"version_value" : "5.0.6"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"affected": "=",
|
"affected" : "=",
|
||||||
"platform": "x86",
|
"platform" : "x86",
|
||||||
"version_name": "5.5.0",
|
"version_name" : "5.5.0",
|
||||||
"version_value": "5.5.0"
|
"version_value" : "5.5.0"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"affected": "=",
|
"affected" : "=",
|
||||||
"platform": "x86",
|
"platform" : "x86",
|
||||||
"version_name": "5.5.1",
|
"version_name" : "5.5.1",
|
||||||
"version_value": "5.5.1"
|
"version_value" : "5.5.1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name": "McAfee"
|
"vendor_name" : "McAfee"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"credit": [
|
"credit" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "McAfee credits Brandon Vincent for discovery of this vulnerability."
|
"value" : "McAfee credits Brandon Vincent for discovery of this vulnerability."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"data_format": "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type" : "CVE",
|
||||||
"data_version": "4.0",
|
"data_version" : "4.0",
|
||||||
"description": {
|
"description" : {
|
||||||
"description_data": [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism."
|
"value" : "Denial of Service through Resource Depletion vulnerability in the agent in non-Windows McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to cause DoS, unexpected behavior, or potentially unauthorized code execution via knowledge of the internal trust mechanism."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"problemtype": {
|
"problemtype" : {
|
||||||
"problemtype_data": [
|
"problemtype_data" : [
|
||||||
{
|
{
|
||||||
"description": [
|
"description" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "Denial of Service"
|
"value" : "Denial of Service"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": {
|
"references" : {
|
||||||
"reference_data": [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10260",
|
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10260",
|
||||||
"refsource": "CONFIRM",
|
"refsource" : "CONFIRM",
|
||||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10260"
|
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10260"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"solution": [
|
"solution" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "upgrade to McAfee Agent 5.6.0"
|
"value" : "upgrade to McAfee Agent 5.6.0"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"source": {
|
"source" : {
|
||||||
"advisory": "SB10260",
|
"advisory" : "SB10260",
|
||||||
"discovery": "EXTERNAL"
|
"discovery" : "EXTERNAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user