From f0a59a6caeafc0601cb5b688d2cbe214d5d298af Mon Sep 17 00:00:00 2001 From: Will Dormann Date: Mon, 26 Oct 2020 13:36:49 -0400 Subject: [PATCH 1/2] CVE for Macrium Reflect VU#760767 --- 2020/10xxx/CVE-2020-10143.json | 85 +++++++++++++++++++++++++++++++--- 1 file changed, 79 insertions(+), 6 deletions(-) diff --git a/2020/10xxx/CVE-2020-10143.json b/2020/10xxx/CVE-2020-10143.json index c26859568dc..fc9bc11137c 100644 --- a/2020/10xxx/CVE-2020-10143.json +++ b/2020/10xxx/CVE-2020-10143.json @@ -1,18 +1,91 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cert@cert.org", "ID": "CVE-2020-10143", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Reflect", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "7", + "version_value": "7.3.5281" + } + ] + } + } + ] + }, + "vendor_name": "Macrium" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Will Dormann" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Macrium Reflect includes an OpenSSL component that specifies an OPENSSLDIR variable as C:\\openssl\\. Macrium Reflect contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges." } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284 Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CERT-VN", + "url": "https://www.kb.cert.org/vuls/id/760767" + } + ] + }, + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file From 5fd735387c41767961b0d7875a37fa04aba4ed55 Mon Sep 17 00:00:00 2001 From: Will Dormann Date: Wed, 11 Nov 2020 09:21:18 -0500 Subject: [PATCH 2/2] Update to indicate that the vulnerability was introduced in 7.2 --- 2020/10xxx/CVE-2020-10143.json | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/2020/10xxx/CVE-2020-10143.json b/2020/10xxx/CVE-2020-10143.json index fc9bc11137c..4f409b59fff 100644 --- a/2020/10xxx/CVE-2020-10143.json +++ b/2020/10xxx/CVE-2020-10143.json @@ -14,9 +14,14 @@ "product_name": "Reflect", "version": { "version_data": [ + { + "version_affected": ">=", + "version_name": "7.2", + "version_value": "7.2" + }, { "version_affected": "<", - "version_name": "7", + "version_name": "7.3", "version_value": "7.3.5281" } ]