From c954e39688e3ace8acb6e8bc1a5ace87cb38f996 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 11 Jul 2019 20:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/3xxx/CVE-2014-3798.json | 63 ++++- 2018/1xxx/CVE-2018-1968.json | 174 +++++++------- 2019/0xxx/CVE-2019-0046.json | 277 ++++++++++------------ 2019/0xxx/CVE-2019-0048.json | 288 +++++++++++------------ 2019/0xxx/CVE-2019-0049.json | 296 +++++++++++------------ 2019/0xxx/CVE-2019-0052.json | 288 +++++++++++------------ 2019/0xxx/CVE-2019-0053.json | 362 +++++++++++++---------------- 2019/1010xxx/CVE-2019-1010314.json | 56 ++++- 2019/1010xxx/CVE-2019-1010315.json | 61 ++++- 2019/1010xxx/CVE-2019-1010316.json | 56 ++++- 2019/1010xxx/CVE-2019-1010317.json | 61 ++++- 2019/1010xxx/CVE-2019-1010318.json | 61 ++++- 2019/1010xxx/CVE-2019-1010319.json | 61 ++++- 2019/10xxx/CVE-2019-10970.json | 55 ++++- 2019/11xxx/CVE-2019-11387.json | 16 +- 2019/12xxx/CVE-2019-12571.json | 56 ++++- 2019/12xxx/CVE-2019-12573.json | 56 ++++- 2019/12xxx/CVE-2019-12574.json | 56 ++++- 2019/12xxx/CVE-2019-12575.json | 56 ++++- 2019/12xxx/CVE-2019-12576.json | 56 ++++- 2019/12xxx/CVE-2019-12577.json | 56 ++++- 2019/12xxx/CVE-2019-12578.json | 56 ++++- 2019/12xxx/CVE-2019-12579.json | 56 ++++- 2019/4xxx/CVE-2019-4118.json | 188 +++++++-------- 2019/4xxx/CVE-2019-4131.json | 172 +++++++------- 2019/4xxx/CVE-2019-4193.json | 182 +++++++-------- 2019/4xxx/CVE-2019-4263.json | 172 +++++++------- 27 files changed, 1982 insertions(+), 1355 deletions(-) diff --git a/2014/3xxx/CVE-2014-3798.json b/2014/3xxx/CVE-2014-3798.json index 25010d612ed..afb5ebf4ef6 100644 --- a/2014/3xxx/CVE-2014-3798.json +++ b/2014/3xxx/CVE-2014-3798.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3798", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,66 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "SECTRACK", + "name": "1030304", + "url": "http://www.securitytracker.com/id/1030304" + }, + { + "refsource": "BID", + "name": "67693", + "url": "http://www.securityfocus.com/bid/67693" + }, + { + "refsource": "CONFIRM", + "name": "http://support.citrix.com/article/CTX140814", + "url": "http://support.citrix.com/article/CTX140814" + }, + { + "refsource": "SECUNIA", + "name": "58455", + "url": "http://secunia.com/advisories/58455" } ] } diff --git a/2018/1xxx/CVE-2018-1968.json b/2018/1xxx/CVE-2018-1968.json index a8183fcb8bd..562ed2d23ce 100644 --- a/2018/1xxx/CVE-2018-1968.json +++ b/2018/1xxx/CVE-2018-1968.json @@ -1,90 +1,90 @@ { - "CVE_data_meta" : { - "DATE_PUBLIC" : "2019-07-02T00:00:00", - "ID" : "CVE-2018-1968", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com" - }, - "data_type" : "CVE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10958077", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 958077 (Security Identity Manager)", - "name" : "http://www.ibm.com/support/docview.wss?uid=ibm10958077" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/153749", - "name" : "ibm-sim-cve20181968-info-disc (153749)", - "title" : "X-Force Vulnerability Report", - "refsource" : "XF" - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "A" : "N", - "SCORE" : "5.300", - "UI" : "N", - "C" : "L", - "AC" : "L", - "AV" : "N", - "I" : "N", - "S" : "U", - "PR" : "N" - } - } - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "CVE_data_meta": { + "DATE_PUBLIC": "2019-07-02T00:00:00", + "ID": "CVE-2018-1968", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com" + }, + "data_type": "CVE", + "problemtype": { + "problemtype_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "7.0.1" - } - ] - }, - "product_name" : "Security Identity Manager" - } - ] - } + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] } - ] - } - }, - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "value" : "IBM Security Identity Manager 7.0.1 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 153749.", - "lang" : "eng" - } - ] - }, - "data_format" : "MITRE" -} + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.ibm.com/support/docview.wss?uid=ibm10958077", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 958077 (Security Identity Manager)", + "name": "http://www.ibm.com/support/docview.wss?uid=ibm10958077" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/153749", + "name": "ibm-sim-cve20181968-info-disc (153749)", + "title": "X-Force Vulnerability Report", + "refsource": "XF" + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "A": "N", + "SCORE": "5.300", + "UI": "N", + "C": "L", + "AC": "L", + "AV": "N", + "I": "N", + "S": "U", + "PR": "N" + } + } + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "7.0.1" + } + ] + }, + "product_name": "Security Identity Manager" + } + ] + } + } + ] + } + }, + "data_version": "4.0", + "description": { + "description_data": [ + { + "value": "IBM Security Identity Manager 7.0.1 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 153749.", + "lang": "eng" + } + ] + }, + "data_format": "MITRE" +} \ No newline at end of file diff --git a/2019/0xxx/CVE-2019-0046.json b/2019/0xxx/CVE-2019-0046.json index 0e1e0448913..78ac8150303 100644 --- a/2019/0xxx/CVE-2019-0046.json +++ b/2019/0xxx/CVE-2019-0046.json @@ -1,151 +1,132 @@ { - "CVE_data_meta": { - "ASSIGNER": "sirt@juniper.net", - "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", - "ID": "CVE-2019-0046", - "STATE": "PUBLIC", - "TITLE": "Junos OS: EX4300 Series: Denial of Service upon receipt of large number of specific valid packets on management interface." - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Junos OS", - "version": { - "version_data": [ - { - "version_affected": ">=", - "version_name": "16.1", - "version_value": "16.1R1" - }, - { - "version_affected": "<", - "version_name": "17.1", - "version_value": "17.1R3" - }, - { - "version_affected": "<", - "version_name": "17.2", - "version_value": "17.2R3" - }, - { - "version_affected": "<", - "version_name": "17.3", - "version_value": "17.3R3-S2" - }, - { - "version_affected": "<", - "version_name": "17.4", - "version_value": "17.4R2" - }, - { - "version_affected": "<", - "version_name": "18.1", - "version_value": "18.1R3" - }, - { - "version_affected": "<", - "version_name": "18.2", - "version_value": "18.2R2" - }, - { - "version_affected": "<", - "version_name": "16.1", - "version_value": "16.1R7-S5" - } - ] - } - } - ] - }, - "vendor_name": "Juniper Networks" - } - ] - } - }, - "configuration": [ - { - "lang": "eng", - "value": "The following minimal configuration is required:\n set interfaces me0" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability in the pfe-chassisd Chassis Manager (CMLC) daemon of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the EX4300 when specific valid broadcast packets create a broadcast storm condition when received on the me0 interface of the EX4300 Series device. A reboot of the device is required to restore service. Continued receipt of these valid broadcast packets will create a sustained Denial of Service (DoS) against the device.\n\nAffected releases are Juniper Networks Junos OS:\n16.1 versions above and including 16.1R1 prior to 16.1R7-S5;\n17.1 versions prior to 17.1R3;\n17.2 versions prior to 17.2R3;\n17.3 versions prior to 17.3R3-S2;\n17.4 versions prior to 17.4R2;\n18.1 versions prior to 18.1R3;\n18.2 versions prior to 18.2R2." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." - } - ], - "generator": { - "engine": "Vulnogram 0.0.6" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-400 Uncontrolled Resource Consumption" - } + "CVE_data_meta": { + "ASSIGNER": "sirt@juniper.net", + "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", + "ID": "CVE-2019-0046", + "STATE": "PUBLIC", + "TITLE": "Junos OS: EX4300 Series: Denial of Service upon receipt of large number of specific valid packets on management interface." + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "16.1 versions above and including 16.1R1 prior to 16.1R7-S5" + }, + { + "version_value": "17.1 versions prior to 17.1R3" + }, + { + "version_value": "17.2 versions prior to 17.2R3" + }, + { + "version_value": "17.3 versions prior to 17.3R3-S2" + }, + { + "version_value": "17.4 versions prior to 17.4R2" + }, + { + "version_value": "18.1 versions prior to 18.1R3" + }, + { + "version_value": "18.2 versions prior to 18.2R2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://kb.juniper.net/JSA10938", - "refsource": "CONFIRM", - "url": "https://kb.juniper.net/JSA10938" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "The following software releases have been updated to resolve this specific issue: 16.1R7-S5, 17.1R3, 17.2R3, 17.3R3-S2, 17.4R2, 18.1R3, 18.2R2, 18.3R1, and all subsequent releases.\n" - } - ], - "source": { - "advisory": "JSA10938", - "defect": [ - "1329430" - ], - "discovery": "USER" - }, - "work_around": [ - { - "lang": "eng", - "value": "There are no viable workarounds for this issue." - } - ] + } + }, + "configuration": [ + { + "lang": "eng", + "value": "The following minimal configuration is required:\n set interfaces me0" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability in the pfe-chassisd Chassis Manager (CMLC) daemon of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the EX4300 when specific valid broadcast packets create a broadcast storm condition when received on the me0 interface of the EX4300 Series device. A reboot of the device is required to restore service. Continued receipt of these valid broadcast packets will create a sustained Denial of Service (DoS) against the device. Affected releases are Juniper Networks Junos OS: 16.1 versions above and including 16.1R1 prior to 16.1R7-S5; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2." + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "generator": { + "engine": "Vulnogram 0.0.6" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kb.juniper.net/JSA10938", + "refsource": "CONFIRM", + "url": "https://kb.juniper.net/JSA10938" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The following software releases have been updated to resolve this specific issue: 16.1R7-S5, 17.1R3, 17.2R3, 17.3R3-S2, 17.4R2, 18.1R3, 18.2R2, 18.3R1, and all subsequent releases.\n" + } + ], + "source": { + "advisory": "JSA10938", + "defect": [ + "1329430" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "eng", + "value": "There are no viable workarounds for this issue." + } + ] } \ No newline at end of file diff --git a/2019/0xxx/CVE-2019-0048.json b/2019/0xxx/CVE-2019-0048.json index 768bd573aad..fd614f77bb1 100644 --- a/2019/0xxx/CVE-2019-0048.json +++ b/2019/0xxx/CVE-2019-0048.json @@ -1,159 +1,135 @@ { - "CVE_data_meta": { - "ASSIGNER": "sirt@juniper.net", - "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", - "ID": "CVE-2019-0048", - "STATE": "PUBLIC", - "TITLE": "EX4300 Series: When a firewall filter is applied to a loopback interface, other firewall filters for multicast traffic may fail" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Junos OS", - "version": { - "version_data": [ - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "14.1X53", - "version_value": "14.1X53-D51, 14.1X53-D115" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "17.1", - "version_value": "17.1R3" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "17.2", - "version_value": "17.2R3-S2" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "17.3", - "version_value": "17.3R3-S3" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "17.4", - "version_value": "17.4R2-S5, 17.4R3" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "18.1", - "version_value": "18.1R3-S1" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "18.2", - "version_value": "18.2R2" - }, - { - "platform": "EX4300 Series", - "version_affected": "<", - "version_name": "18.3", - "version_value": "18.3R2" - } - ] - } - } - ] - }, - "vendor_name": "Juniper Networks" - } - ] - } - }, - "configuration": [ - { - "lang": "eng", - "value": "This issue only affects EX Series switches with TCAM optimization enabled:\n\n set system packet-forwarding-options tcam-group-optimization\n" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "On EX4300 Series switches with TCAM optimization enabled, incoming multicast traffic matches an implicit loopback filter rule first, since it has high priority. This rule is meant for reserved multicast addresses 224.0.0.x, but incorrectly matches on 224.x.x.x. Due to this bug, when a firewall filter is applied on the loopback interface, other firewall filters might stop working for multicast traffic.\n\nThe command 'show firewall filter' can be used to confirm whether the filter is working.\n\nThis issue only affects the EX4300 switch. No other products or platforms are affected by this vulnerability.\nThis issue affects:\nJuniper Networks Junos OS:\n14.1X53 versions prior to 14.1X53-D51, 14.1X53-D115 on EX4300 Series;\n17.1 versions prior to 17.1R3 on EX4300 Series;\n17.2 versions prior to 17.2R3-S2 on EX4300 Series;\n17.3 versions prior to 17.3R3-S3 on EX4300 Series;\n17.4 versions prior to 17.4R2-S5, 17.4R3 on EX4300 Series;\n18.1 versions prior to 18.1R3-S1 on EX4300 Series;\n18.2 versions prior to 18.2R2 on EX4300 Series;\n18.3 versions prior to 18.3R2 on EX4300 Series." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." - } - ], - "generator": { - "engine": "Vulnogram 0.0.6" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 5.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "NONE", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-200 Information Exposure" - } + "CVE_data_meta": { + "ASSIGNER": "sirt@juniper.net", + "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", + "ID": "CVE-2019-0048", + "STATE": "PUBLIC", + "TITLE": "EX4300 Series: When a firewall filter is applied to a loopback interface, other firewall filters for multicast traffic may fail" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "14.1X53 versions prior to 14.1X53-D51 and 14.1X53-D115 on EX4300 Series" + }, + { + "version_value": "17.1 versions prior to 17.1R3 on EX4300 Series" + }, + { + "version_value": "17.2 versions prior to 17.2R3-S2 on EX4300 Series" + }, + { + "version_value": "17.3 versions prior to 17.3R3-S3 on EX4300 Series" + }, + { + "version_value": "17.4 versions prior to 17.4R2-S5 and 17.4R3 on EX4300 Series" + }, + { + "version_value": "18.1 versions prior to 18.1R3-S1 on EX4300 Series" + }, + { + "version_value": "18.2 versions prior to 18.2R2 on EX4300 Series" + }, + { + "version_value": "18.3 versions prior to 18.3R2 on EX4300 Series" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://kb.juniper.net/JSA10942", - "refsource": "CONFIRM", - "url": "https://kb.juniper.net/JSA10942" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "The following software releases have been updated to resolve this specific issue: 14.1X53-D51, 14.1X53-D115, 17.1R3, 17.2R3-S2, 17.3R3-S3, 17.4R2-S5, 17.4R3, 18.1R3-S1, 18.2R2, 18.3R2, 18.4R1, and all subsequent releases.\n" - } - ], - "source": { - "advisory": "JSA10942", - "defect": [ - "1392082" - ], - "discovery": "USER" - }, - "work_around": [ - { - "lang": "eng", - "value": "Disabling TCAM optimization will mitigate this issue." - } - ] + } + }, + "configuration": [ + { + "lang": "eng", + "value": "This issue only affects EX Series switches with TCAM optimization enabled:\n\n set system packet-forwarding-options tcam-group-optimization\n" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On EX4300 Series switches with TCAM optimization enabled, incoming multicast traffic matches an implicit loopback filter rule first, since it has high priority. This rule is meant for reserved multicast addresses 224.0.0.x, but incorrectly matches on 224.x.x.x. Due to this bug, when a firewall filter is applied on the loopback interface, other firewall filters might stop working for multicast traffic. The command 'show firewall filter' can be used to confirm whether the filter is working. This issue only affects the EX4300 switch. No other products or platforms are affected by this vulnerability. This issue affects: Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D51, 14.1X53-D115 on EX4300 Series; 17.1 versions prior to 17.1R3 on EX4300 Series; 17.2 versions prior to 17.2R3-S2 on EX4300 Series; 17.3 versions prior to 17.3R3-S3 on EX4300 Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on EX4300 Series; 18.1 versions prior to 18.1R3-S1 on EX4300 Series; 18.2 versions prior to 18.2R2 on EX4300 Series; 18.3 versions prior to 18.3R2 on EX4300 Series." + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "generator": { + "engine": "Vulnogram 0.0.6" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kb.juniper.net/JSA10942", + "refsource": "CONFIRM", + "url": "https://kb.juniper.net/JSA10942" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The following software releases have been updated to resolve this specific issue: 14.1X53-D51, 14.1X53-D115, 17.1R3, 17.2R3-S2, 17.3R3-S3, 17.4R2-S5, 17.4R3, 18.1R3-S1, 18.2R2, 18.3R2, 18.4R1, and all subsequent releases.\n" + } + ], + "source": { + "advisory": "JSA10942", + "defect": [ + "1392082" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "eng", + "value": "Disabling TCAM optimization will mitigate this issue." + } + ] } \ No newline at end of file diff --git a/2019/0xxx/CVE-2019-0049.json b/2019/0xxx/CVE-2019-0049.json index 68218fd361a..2e52440f0ef 100644 --- a/2019/0xxx/CVE-2019-0049.json +++ b/2019/0xxx/CVE-2019-0049.json @@ -1,164 +1,138 @@ { - "CVE_data_meta": { - "ASSIGNER": "sirt@juniper.net", - "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", - "ID": "CVE-2019-0049", - "STATE": "PUBLIC", - "TITLE": "Junos OS: RPD process crashes when BGP peer restarts" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Junos OS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "16.1", - "version_value": "16.1R7-S3" - }, - { - "version_affected": "<", - "version_name": "16.2", - "version_value": "16.2R2-S9" - }, - { - "version_affected": "<", - "version_name": "17.1", - "version_value": "17.1R3" - }, - { - "version_affected": "<", - "version_name": "17.2", - "version_value": "17.2R3" - }, - { - "version_affected": "<", - "version_name": "17.2X75", - "version_value": "17.2X75-D105" - }, - { - "version_affected": "<", - "version_name": "17.3", - "version_value": "17.3R3-S2" - }, - { - "version_affected": "<", - "version_name": "17.4", - "version_value": "17.4R1-S7, 17.4R2-S2, 17.4R3" - }, - { - "version_affected": "<", - "version_name": "18.1", - "version_value": "18.1R3-S2" - }, - { - "version_affected": "<", - "version_name": "18.2", - "version_value": "18.2R2" - }, - { - "version_affected": "<", - "version_name": "18.2X75", - "version_value": "18.2X75-D12, 18.2X75-D30" - }, - { - "version_affected": "<", - "version_name": "18.3", - "version_value": "18.3R1-S4, 18.3R2" - }, - { - "version_affected": "!<", - "version_value": "16.1R1" - } - ] - } - } - ] - }, - "vendor_name": "Juniper Networks" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "On Junos devices with the BGP graceful restart helper mode enabled or the BGP graceful restart mechanism enabled, a certain sequence of BGP session restart on a remote peer that has the graceful restart mechanism enabled may cause the local routing protocol daemon (RPD) process to crash and restart. Repeated crashes of the RPD process can cause prolonged Denial of Service (DoS). \n\nGraceful restart helper mode for BGP is enabled by default.\n\nNo other Juniper Networks products or platforms are affected by this issue.\nAffected releases are Juniper Networks Junos OS:\n16.1 versions prior to 16.1R7-S3;\n16.2 versions prior to 16.2R2-S9;\n17.1 versions prior to 17.1R3;\n17.2 versions prior to 17.2R3;\n17.2X75 versions prior to 17.2X75-D105;\n17.3 versions prior to 17.3R3-S2;\n17.4 versions prior to 17.4R1-S7, 17.4R2-S2, 17.4R3;\n18.1 versions prior to 18.1R3-S2;\n18.2 versions prior to 18.2R2;\n18.2X75 versions prior to 18.2X75-D12, 18.2X75-D30;\n18.3 versions prior to 18.3R1-S4, 18.3R2.\n\nJunos OS releases prior to 16.1R1 are not affected." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." - } - ], - "generator": { - "engine": "Vulnogram 0.0.6" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-404 Improper Resource Shutdown or Release" - } + "CVE_data_meta": { + "ASSIGNER": "sirt@juniper.net", + "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", + "ID": "CVE-2019-0049", + "STATE": "PUBLIC", + "TITLE": "Junos OS: RPD process crashes when BGP peer restarts" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "16.1 versions prior to 16.1R7-S3" + }, + { + "version_value": "16.2 versions prior to 16.2R2-S9" + }, + { + "version_value": "17.1 versions prior to 17.1R3" + }, + { + "version_value": "17.2 versions prior to 17.2R3" + }, + { + "version_value": "17.2X75 versions prior to 17.2X75-D105" + }, + { + "version_value": "17.3 versions prior to 17.3R3-S2" + }, + { + "version_value": "17.4 versions prior to 17.4R1-S7 to 17.4R2-S2 and to 17.4R3" + }, + { + "version_value": "18.1 versions prior to 18.1R3-S2" + }, + { + "version_value": "18.2 versions prior to 18.2R2" + }, + { + "version_value": "18.2X75 versions prior to 18.2X75-D12 and 18.2X75-D30" + }, + { + "version_value": "18.3 versions prior to 18.3R1-S4 and 18.3R2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://kb.juniper.net/JSA10943", - "refsource": "CONFIRM", - "url": "https://kb.juniper.net/JSA10943" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "The following software releases have been updated to resolve this specific issue: 16.1R7-S3, 16.2R2-S9, 17.1R3, 17.2R3, 17.2X75-D105, 17.3R3-S2, 17.4R1-S7, 17.4R2-S2, 17.4R3, 18.1R3-S2, 18.2R2, 18.2X75-D12, 18.2X75-D30, 18.3R1-S4, 18.3R2, 18.4R1, and all subsequent releases." - } - ], - "source": { - "advisory": "JSA10943", - "defect": [ - "1337304" - ], - "discovery": "USER" - }, - "work_around": [ - { - "lang": "eng", - "value": "This issue can be prevented by disabling the BGP graceful restart mechanism, including graceful restart helper mode:\n [protocols bgp graceful-restart disable]\n\nFurthermore, the risk associated with this issue can be mitigated by limiting BGP sessions only from trusted peers.\n" - } - ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On Junos devices with the BGP graceful restart helper mode enabled or the BGP graceful restart mechanism enabled, a certain sequence of BGP session restart on a remote peer that has the graceful restart mechanism enabled may cause the local routing protocol daemon (RPD) process to crash and restart. Repeated crashes of the RPD process can cause prolonged Denial of Service (DoS). Graceful restart helper mode for BGP is enabled by default. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S3; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.2X75 versions prior to 17.2X75-D105; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R1-S7, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R3-S2; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D30; 18.3 versions prior to 18.3R1-S4, 18.3R2. Junos OS releases prior to 16.1R1 are not affected." + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "generator": { + "engine": "Vulnogram 0.0.6" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-404 Improper Resource Shutdown or Release" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kb.juniper.net/JSA10943", + "refsource": "CONFIRM", + "url": "https://kb.juniper.net/JSA10943" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The following software releases have been updated to resolve this specific issue: 16.1R7-S3, 16.2R2-S9, 17.1R3, 17.2R3, 17.2X75-D105, 17.3R3-S2, 17.4R1-S7, 17.4R2-S2, 17.4R3, 18.1R3-S2, 18.2R2, 18.2X75-D12, 18.2X75-D30, 18.3R1-S4, 18.3R2, 18.4R1, and all subsequent releases." + } + ], + "source": { + "advisory": "JSA10943", + "defect": [ + "1337304" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "eng", + "value": "This issue can be prevented by disabling the BGP graceful restart mechanism, including graceful restart helper mode:\n [protocols bgp graceful-restart disable]\n\nFurthermore, the risk associated with this issue can be mitigated by limiting BGP sessions only from trusted peers.\n" + } + ] } \ No newline at end of file diff --git a/2019/0xxx/CVE-2019-0052.json b/2019/0xxx/CVE-2019-0052.json index 3d132a1af90..de812eba57c 100644 --- a/2019/0xxx/CVE-2019-0052.json +++ b/2019/0xxx/CVE-2019-0052.json @@ -1,159 +1,135 @@ { - "CVE_data_meta": { - "ASSIGNER": "sirt@juniper.net", - "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", - "ID": "CVE-2019-0052", - "STATE": "PUBLIC", - "TITLE": "SRX Series: srxpfe process crash while JSF/UTM module parses specific HTTP packets" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Junos OS", - "version": { - "version_data": [ - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "12.3X48", - "version_value": "12.3X48-D85" - }, - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "15.1X49", - "version_value": "15.1X49-D181, 15.1X49-D190" - }, - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "17.4", - "version_value": "17.4R1-S8, 17.4R2-S5, 17.4R3" - }, - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "18.1", - "version_value": "18.1R3-S6" - }, - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "18.2", - "version_value": "18.2R2-S1, 18.2R3" - }, - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "18.3", - "version_value": "18.3R1-S2, 18.3R2" - }, - { - "platform": "SRX Series", - "version_affected": "<", - "version_name": "18.4", - "version_value": "18.4R1-S1, 18.4R2" - }, - { - "platform": "SRX Series", - "version_affected": ">=", - "version_name": "17.3", - "version_value": "17.3R1" - } - ] - } - } - ] - }, - "vendor_name": "Juniper Networks" - } - ] - } - }, - "configuration": [ - { - "lang": "eng", - "value": "Sample SRX Series services gateway web-filtering configuration:\n\n security {\n utm {\n default-configuration {\n web-filtering {\n ...\n feature-profile {\n web-filtering {\n" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash.\n\nThis issue affects all SRX Series platforms that support URL-Filtering and have web-filtering enabled.\n\nAffected releases are Juniper Networks Junos OS:\n12.3X48 versions prior to 12.3X48-D85 on SRX Series;\n15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series;\n17.3 versions on SRX Series;\n17.4 versions prior to 17.4R1-S8, 17.4R2-S5, 17.4R3 on SRX Series;\n18.1 versions prior to 18.1R3-S6 on SRX Series;\n18.2 versions prior to 18.2R2-S1, 18.2R3 on SRX Series;\n18.3 versions prior to 18.3R1-S2, 18.3R2 on SRX Series;\n18.4 versions prior to 18.4R1-S1, 18.4R2 on SRX Series.\n" - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." - } - ], - "generator": { - "engine": "Vulnogram 0.0.6" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-404 Improper Resource Shutdown or Release" - } + "CVE_data_meta": { + "ASSIGNER": "sirt@juniper.net", + "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", + "ID": "CVE-2019-0052", + "STATE": "PUBLIC", + "TITLE": "SRX Series: srxpfe process crash while JSF/UTM module parses specific HTTP packets" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "12.3X48 versions prior to 12.3X48-D85 on SRX Series" + }, + { + "version_value": "15.1X49 versions prior to 15.1X49-D181 and 15.1X49-D190 on SRX Series" + }, + { + "version_value": "17.3 versions on SRX Series" + }, + { + "version_value": "17.4 versions prior to 17.4R1-S8 and to 17.4R2-S5 and to 17.4R3 on SRX Series" + }, + { + "version_value": "18.1 versions prior to 18.1R3-S6 on SRX Series" + }, + { + "version_value": "18.2 versions prior to 18.2R2-S1 and to 18.2R3 on SRX Series" + }, + { + "version_value": "18.3 versions prior to 18.3R1-S2 and to 18.3R2 on SRX Series" + }, + { + "version_value": "18.4 versions prior to 18.4R1-S1 and to 18.4R2 on SRX Series" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://kb.juniper.net/JSA10946", - "refsource": "CONFIRM", - "url": "https://kb.juniper.net/JSA10946" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "The following software releases have been updated to resolve this specific issue: 12.3X48-D85, 12.3X48-D90, 15.1X49-D181, 15.1X49-D190, 17.4R1-S8, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S1, 18.2R3, 18.3R1-S2, 18.3R2, 18.4R1-S1, 18.4R2, 19.1R1, 19.2R1, and all subsequent releases.\n" - } - ], - "source": { - "advisory": "JSA10946", - "defect": [ - "1406403" - ], - "discovery": "USER" - }, - "work_around": [ - { - "lang": "eng", - "value": "This issue can be mitigated by enabling HTTP reassembly in the web-filtering configuration:\n\n set security utm default-configuration web-filtering http-reassemble\n" - } - ] + } + }, + "configuration": [ + { + "lang": "eng", + "value": "Sample SRX Series services gateway web-filtering configuration:\n\n security {\n utm {\n default-configuration {\n web-filtering {\n ...\n feature-profile {\n web-filtering {\n" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash. This issue affects all SRX Series platforms that support URL-Filtering and have web-filtering enabled. Affected releases are Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series; 17.3 versions on SRX Series; 17.4 versions prior to 17.4R1-S8, 17.4R2-S5, 17.4R3 on SRX Series; 18.1 versions prior to 18.1R3-S6 on SRX Series; 18.2 versions prior to 18.2R2-S1, 18.2R3 on SRX Series; 18.3 versions prior to 18.3R1-S2, 18.3R2 on SRX Series; 18.4 versions prior to 18.4R1-S1, 18.4R2 on SRX Series." + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "generator": { + "engine": "Vulnogram 0.0.6" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-404 Improper Resource Shutdown or Release" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kb.juniper.net/JSA10946", + "refsource": "CONFIRM", + "url": "https://kb.juniper.net/JSA10946" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The following software releases have been updated to resolve this specific issue: 12.3X48-D85, 12.3X48-D90, 15.1X49-D181, 15.1X49-D190, 17.4R1-S8, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S1, 18.2R3, 18.3R1-S2, 18.3R2, 18.4R1-S1, 18.4R2, 19.1R1, 19.2R1, and all subsequent releases.\n" + } + ], + "source": { + "advisory": "JSA10946", + "defect": [ + "1406403" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "eng", + "value": "This issue can be mitigated by enabling HTTP reassembly in the web-filtering configuration:\n\n set security utm default-configuration web-filtering http-reassemble\n" + } + ] } \ No newline at end of file diff --git a/2019/0xxx/CVE-2019-0053.json b/2019/0xxx/CVE-2019-0053.json index 8a022945fc0..025a7d6a709 100644 --- a/2019/0xxx/CVE-2019-0053.json +++ b/2019/0xxx/CVE-2019-0053.json @@ -1,201 +1,167 @@ { - "CVE_data_meta": { - "ASSIGNER": "sirt@juniper.net", - "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", - "ID": "CVE-2019-0053", - "STATE": "PUBLIC", - "TITLE": "Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Junos OS", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "12.3", - "version_value": "12.3R12-S13" - }, - { - "version_affected": "<", - "version_name": "12.3X48", - "version_value": "12.3X48-D80" - }, - { - "version_affected": "<", - "version_name": "14.1X53", - "version_value": "14.1X53-D130, 14.1X53-D49" - }, - { - "version_affected": "<", - "version_name": "15.1", - "version_value": "15.1F6-S12, 15.1R7-S4" - }, - { - "version_affected": "<", - "version_name": "15.1X49", - "version_value": "15.1X49-D170" - }, - { - "version_affected": "<", - "version_name": "15.1X53", - "version_value": "15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69" - }, - { - "version_affected": "<", - "version_name": "16.1", - "version_value": "16.1R3-S11, 16.1R7-S4" - }, - { - "version_affected": "<", - "version_name": "16.2", - "version_value": "16.2R2-S9" - }, - { - "version_affected": "<", - "version_name": "17.1", - "version_value": "17.1R3" - }, - { - "version_affected": "<", - "version_name": "17.2", - "version_value": "17.2R1-S8, 17.2R2-S7, 17.2R3-S1" - }, - { - "version_affected": "<", - "version_name": "17.3", - "version_value": "17.3R3-S4" - }, - { - "version_affected": "<", - "version_name": "17.4", - "version_value": "17.4R1-S6, 17.4R2-S3, 17.4R3" - }, - { - "version_affected": "<", - "version_name": "18.1", - "version_value": "18.1R2-S4, 18.1R3-S3" - }, - { - "version_affected": "<", - "version_name": "18.2", - "version_value": "18.2R1-S5, 18.2R2-S2, 18.2R3" - }, - { - "version_affected": "<", - "version_name": "18.2X75", - "version_value": "18.2X75-D40" - }, - { - "version_affected": "<", - "version_name": "18.3", - "version_value": "18.3R1-S3, 18.3R2" - }, - { - "version_affected": "<", - "version_name": "18.4", - "version_value": "18.4R1-S2, 18.4R2" - } - ] - } - } - ] - }, - "vendor_name": "Juniper Networks" - } - ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Matthew Hickey, Hacker House (https://hacker.house/) who reported this issue on November 12, 2018.\n\n" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers.\n\nThis issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue.\n\nThis issue affects:\nJuniper Networks Junos OS:\n12.3 versions prior to 12.3R12-S13;\n12.3X48 versions prior to 12.3X48-D80;\n14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49;\n15.1 versions prior to 15.1F6-S12, 15.1R7-S4;\n15.1X49 versions prior to 15.1X49-D170;\n15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69;\n16.1 versions prior to 16.1R3-S11, 16.1R7-S4;\n16.2 versions prior to 16.2R2-S9;\n17.1 versions prior to 17.1R3;\n17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1;\n17.3 versions prior to 17.3R3-S4;\n17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3;\n18.1 versions prior to 18.1R2-S4, 18.1R3-S3;\n18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3;\n18.2X75 versions prior to 18.2X75-D40;\n18.3 versions prior to 18.3R1-S3, 18.3R2;\n18.4 versions prior to 18.4R1-S2, 18.4R2." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." - } - ], - "generator": { - "engine": "Vulnogram 0.0.6" - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-121 Stack-based Buffer Overflow" - } + "CVE_data_meta": { + "ASSIGNER": "sirt@juniper.net", + "DATE_PUBLIC": "2019-07-10T16:00:00.000Z", + "ID": "CVE-2019-0053", + "STATE": "PUBLIC", + "TITLE": "Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "12.3 versions prior to 12.3R12-S13" + }, + { + "version_value": "12.3X48 versions prior to 12.3X48-D80" + }, + { + "version_value": "14.1X53 versions prior to 14.1X53-D130 and 14.1X53-D49" + }, + { + "version_value": "15.1 versions prior to 15.1F6-S12 and15.1R7-S4" + }, + { + "version_value": "15.1X49 versions prior to 15.1X49-D170" + }, + { + "version_value": "15.1X53 versions prior to 15.1X53-D237 and 15.1X53-D496 and 15.1X53-D591 and 15.1X53-D69" + }, + { + "version_value": "16.1 versions prior to 16.1R3-S11 and 16.1R7-S4" + }, + { + "version_value": "16.2 versions prior to 16.2R2-S9" + }, + { + "version_value": "17.1 versions prior to 17.1R3" + }, + { + "version_value": "17.2 versions prior to 17.2R1-S8 and 17.2R2-S7 and 17.2R3-S1" + }, + { + "version_value": "17.3 versions prior to 17.3R3-S4" + }, + { + "version_value": "17.4 versions prior to 17.4R1-S6 and 17.4R2-S3 and 17.4R3" + }, + { + "version_value": "18.1 versions prior to 18.1R2-S4 and 18.1R3-S3" + }, + { + "version_value": "18.2 versions prior to 18.2R1-S5 and 18.2R2-S2 and 18.2R3" + }, + { + "version_value": "18.2X75 versions prior to 18.2X75-D40" + }, + { + "version_value": "18.3 versions prior to 18.3R1-S3 and 18.3R2" + }, + { + "version_value": "18.4 versions prior to 18.4R1-S2 and 18.4R2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://kb.juniper.net/JSA10947", - "refsource": "CONFIRM", - "url": "https://kb.juniper.net/JSA10947" - }, - { - "name": "https://www.exploit-db.com/exploits/45982", - "refsource": "MISC", - "url": "https://www.exploit-db.com/exploits/45982" - } - ] - }, - "solution": [ - { - "lang": "eng", - "value": "The following software releases have been updated to resolve this specific issue: 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 14.1X53-D130, 14.1X53-D49, 15.1F6-S12, 15.1R7-S4, 15.1X49-D170, 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S4, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3-S1, 17.3R3-S4, 17.4R1-S6, 17.4R2-S3, 17.4R3, 18.1R2-S4, 18.1R3-S3, 18.2R1-S5, 18.2R2-S2, 18.2R3, 18.2X75-D40, 18.3R1-S3, 18.3R2, 18.4R1-S2, 18.4R2, 19.1R1, and all subsequent releases.\n" - } - ], - "source": { - "advisory": "JSA10947", - "defect": [ - "1409847" - ], - "discovery": "EXTERNAL" - }, - "work_around": [ - { - "lang": "eng", - "value": "Since this issue is specific to outbound connections to a malicious host from the local telnet client, mitigation includes:\n* limit access to the Junos CLI and shell from only from trusted administrators\n* block outbound telnet connections\n* deny access to the telnet command and shell per user or user class" - } - ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Matthew Hickey, Hacker House (https://hacker.house/) who reported this issue on November 12, 2018.\n\n" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client \u2014 accessible from the CLI or shell \u2014 in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2." + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "generator": { + "engine": "Vulnogram 0.0.6" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121 Stack-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://kb.juniper.net/JSA10947", + "refsource": "CONFIRM", + "url": "https://kb.juniper.net/JSA10947" + }, + { + "name": "https://www.exploit-db.com/exploits/45982", + "refsource": "MISC", + "url": "https://www.exploit-db.com/exploits/45982" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "The following software releases have been updated to resolve this specific issue: 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 14.1X53-D130, 14.1X53-D49, 15.1F6-S12, 15.1R7-S4, 15.1X49-D170, 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S4, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3-S1, 17.3R3-S4, 17.4R1-S6, 17.4R2-S3, 17.4R3, 18.1R2-S4, 18.1R3-S3, 18.2R1-S5, 18.2R2-S2, 18.2R3, 18.2X75-D40, 18.3R1-S3, 18.3R2, 18.4R1-S2, 18.4R2, 19.1R1, and all subsequent releases.\n" + } + ], + "source": { + "advisory": "JSA10947", + "defect": [ + "1409847" + ], + "discovery": "EXTERNAL" + }, + "work_around": [ + { + "lang": "eng", + "value": "Since this issue is specific to outbound connections to a malicious host from the local telnet client, mitigation includes:\n* limit access to the Junos CLI and shell from only from trusted administrators\n* block outbound telnet connections\n* deny access to the telnet command and shell per user or user class" + } + ] } \ No newline at end of file diff --git a/2019/1010xxx/CVE-2019-1010314.json b/2019/1010xxx/CVE-2019-1010314.json index 237004619c2..ee33fb655d9 100644 --- a/2019/1010xxx/CVE-2019-1010314.json +++ b/2019/1010xxx/CVE-2019-1010314.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010314", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Gitea", + "version": { + "version_data": [ + { + "version_value": "1.7.2, 1.7.3" + } + ] + } + } + ] + }, + "vendor_name": "Gitea" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to public and affected repo page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/go-gitea/gitea/releases", + "refsource": "MISC", + "name": "https://github.com/go-gitea/gitea/releases" } ] } diff --git a/2019/1010xxx/CVE-2019-1010315.json b/2019/1010xxx/CVE-2019-1010315.json index 5bc14a9ebe0..b874fa9f598 100644 --- a/2019/1010xxx/CVE-2019-1010315.json +++ b/2019/1010xxx/CVE-2019-1010315.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010315", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WavPack", + "product": { + "product_data": [ + { + "product_name": "WavPack", + "version": { + "version_data": [ + { + "version_value": "<=5.1 [fixed: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc]" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE 369: Divide by Zero" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dbry/WavPack/issues/65", + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/issues/65" + }, + { + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc", + "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" } ] } diff --git a/2019/1010xxx/CVE-2019-1010316.json b/2019/1010xxx/CVE-2019-1010316.json index ef937e9d0e6..c0cfa26e565 100644 --- a/2019/1010xxx/CVE-2019-1010316.json +++ b/2019/1010xxx/CVE-2019-1010316.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010316", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "pyxtrlock", + "product": { + "product_data": [ + { + "product_name": "pyxtrlock", + "version": { + "version_data": [ + { + "version_value": "<=0.3 [fixed: 0.4]" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "pyxtrlock 0.3 and earlier is affected by: Incorrect Access Control. The impact is: False locking impression when run in a non-X11 session. The fixed version is: 0.4." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/leonnnn/pyxtrlock/issues/21", + "refsource": "MISC", + "name": "https://github.com/leonnnn/pyxtrlock/issues/21" } ] } diff --git a/2019/1010xxx/CVE-2019-1010317.json b/2019/1010xxx/CVE-2019-1010317.json index 6fbe0afe6b9..a35bf05f6a4 100644 --- a/2019/1010xxx/CVE-2019-1010317.json +++ b/2019/1010xxx/CVE-2019-1010317.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010317", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "WavPack", + "version": { + "version_data": [ + { + "version_value": "5.1.0 and earlier [fixed: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b]" + } + ] + } + } + ] + }, + "vendor_name": "WavPack" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-457: Use of Uninitialized Variable" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dbry/WavPack/issues/66", + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/issues/66" + }, + { + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b", + "url": "https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b" } ] } diff --git a/2019/1010xxx/CVE-2019-1010318.json b/2019/1010xxx/CVE-2019-1010318.json index 28b9f1e60ee..461345d5380 100644 --- a/2019/1010xxx/CVE-2019-1010318.json +++ b/2019/1010xxx/CVE-2019-1010318.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010318", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WavPack", + "product": { + "product_data": [ + { + "product_name": "WavPack", + "version": { + "version_data": [ + { + "version_value": "<=5.1.0 [fixed: After commit https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4]" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: WavpackSetConfiguration64 (pack_utils.c:198). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-457: Use of Uninitialized Variable" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dbry/WavPack/issues/67", + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/issues/67" + }, + { + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4", + "url": "https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4" } ] } diff --git a/2019/1010xxx/CVE-2019-1010319.json b/2019/1010xxx/CVE-2019-1010319.json index 9cb5b76e03d..86795ad70c3 100644 --- a/2019/1010xxx/CVE-2019-1010319.json +++ b/2019/1010xxx/CVE-2019-1010319.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010319", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WavPack", + "product": { + "product_data": [ + { + "product_name": "WavPack", + "version": { + "version_data": [ + { + "version_value": "<=5.1.0 [fixed: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe]" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-457: Use of Uninitialized Variable" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dbry/WavPack/issues/68", + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/issues/68" + }, + { + "refsource": "MISC", + "name": "https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe", + "url": "https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe" } ] } diff --git a/2019/10xxx/CVE-2019-10970.json b/2019/10xxx/CVE-2019-10970.json index 70567e2e794..011af6dab91 100644 --- a/2019/10xxx/CVE-2019-10970.json +++ b/2019/10xxx/CVE-2019-10970.json @@ -4,14 +4,63 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-10970", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Rockwell Automation PanelView 5510", + "version": { + "version_data": [ + { + "version_value": "all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "IMPROPER ACCESS CONTROL CWE-284" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "BID", + "name": "109105", + "url": "http://www.securityfocus.com/bid/109105" + }, + { + "refsource": "MISC", + "name": "https://www.us-cert.gov/ics/advisories/icsa-19-190-02", + "url": "https://www.us-cert.gov/ics/advisories/icsa-19-190-02" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later), a remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device\u2019s file system." } ] } diff --git a/2019/11xxx/CVE-2019-11387.json b/2019/11xxx/CVE-2019-11387.json index 3bda95f6e12..1705d15169d 100644 --- a/2019/11xxx/CVE-2019-11387.json +++ b/2019/11xxx/CVE-2019-11387.json @@ -53,9 +53,19 @@ "references": { "reference_data": [ { - "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359", - "refsource": "MISC", - "name": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359" + "refsource": "CONFIRM", + "name": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359", + "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1359" + }, + { + "refsource": "CONFIRM", + "name": "https://coreruleset.org/20190627/announcement-owasp-modsecurity-core-rule-set-version-3-1-1/", + "url": "https://coreruleset.org/20190627/announcement-owasp-modsecurity-core-rule-set-version-3-1-1/" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.1/dev/CHANGES", + "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/v3.1/dev/CHANGES" } ] } diff --git a/2019/12xxx/CVE-2019-12571.json b/2019/12xxx/CVE-2019-12571.json index b956d35b6d4..93dfbfb9e84 100644 --- a/2019/12xxx/CVE-2019-12571.json +++ b/2019/12xxx/CVE-2019-12571.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12571", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12571", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v0.9.8 beta (build 02099) for macOS could allow an authenticated, local attacker to overwrite arbitrary files. When the client initiates a connection, the XML /tmp/pia-watcher.plist file is created. If the file exists, it will be truncated and the contents completely overwritten. This file is removed on disconnect. An unprivileged user can create a hard or soft link to arbitrary files owned by any user on the system, including root. This creates a denial of service condition and possible data loss if leveraged by a malicious local user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12571.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12571.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12573.json b/2019/12xxx/CVE-2019-12573.json index d616ae71ace..1d570f99777 100644 --- a/2019/12xxx/CVE-2019-12573.json +++ b/2019/12xxx/CVE-2019-12573.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12573", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12573", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local attacker to overwrite arbitrary files. The openvpn_launcher binary is setuid root. This binary supports the --log option, which accepts a path as an argument. This parameter is not sanitized, which allows a local unprivileged user to overwrite arbitrary files owned by any user on the system, including root. This creates a denial of service condition and possible data loss if leveraged by a malicious local user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12573.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12573.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12574.json b/2019/12xxx/CVE-2019-12574.json index f42b901edc3..d3f2f573232 100644 --- a/2019/12xxx/CVE-2019-12574.json +++ b/2019/12xxx/CVE-2019-12574.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12574", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12574", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v1.0 for Windows could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The PIA client is vulnerable to a DLL injection vulnerability during the software update process. The updater loads several libraries from a folder that authenticated users have write access to. A low privileged user can leverage this vulnerability to execute arbitrary code as SYSTEM." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12574.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12574.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12575.json b/2019/12xxx/CVE-2019-12575.json index fd3b5c948e4..798df7f2d1f 100644 --- a/2019/12xxx/CVE-2019-12575.json +++ b/2019/12xxx/CVE-2019-12575.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12575", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12575", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The root_runner.64 binary is setuid root. This binary executes /opt/pia/ruby/64/ruby, which in turn attempts to load several libraries under /tmp/ruby-deploy.old/lib. A local unprivileged user can create a malicious library under this path to execute arbitrary code as the root user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12575.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12575.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12576.json b/2019/12xxx/CVE-2019-12576.json index 14bfe47f84c..2c0dccf8f67 100644 --- a/2019/12xxx/CVE-2019-12576.json +++ b/2019/12xxx/CVE-2019-12576.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12576", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12576", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The openvpn_launcher binary is setuid root. This program is called during the connection process and executes several operating system utilities to configure the system. The networksetup utility is called using relative paths. A local unprivileged user can execute arbitrary commands as root by creating a networksetup trojan which will be executed during the connection process. This is possible because the PATH environment variable is not reset prior to executing the OS utility." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12576.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12576.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12577.json b/2019/12xxx/CVE-2019-12577.json index ca64fed9103..2899b006c51 100644 --- a/2019/12xxx/CVE-2019-12577.json +++ b/2019/12xxx/CVE-2019-12577.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12577", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12577", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The macOS binary openvpn_launcher.64 is setuid root. This binary creates /tmp/pia_upscript.sh when executed. Because the file creation mask (umask) is not reset, the umask value is inherited from the calling process. This value can be manipulated to cause the privileged binary to create files with world writable permissions. A local unprivileged user can modify /tmp/pia_upscript.sh during the connect process to execute arbitrary code as the root user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12577.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12577.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12578.json b/2019/12xxx/CVE-2019-12578.json index 7b2367954f1..767026116cf 100644 --- a/2019/12xxx/CVE-2019-12578.json +++ b/2019/12xxx/CVE-2019-12578.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12578", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12578", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The openvpn_launcher.64 binary is setuid root. This binary executes /opt/pia/openvpn-64/openvpn, passing the parameters provided from the command line. Care was taken to programmatically disable potentially dangerous openvpn parameters; however, the --route-pre-down parameter can be used. This parameter accepts an arbitrary path to a script/program to be executed when OpenVPN exits. The --script-security parameter also needs to be passed to allow for this action to be taken, and --script-security is not currently in the disabled parameter list. A local unprivileged user can pass a malicious script/binary to the --route-pre-down option, which will be executed as root when openvpn is stopped." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12578.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12578.txt" } ] } diff --git a/2019/12xxx/CVE-2019-12579.json b/2019/12xxx/CVE-2019-12579.json index 2ad285d0867..f2ae6e6e84f 100644 --- a/2019/12xxx/CVE-2019-12579.json +++ b/2019/12xxx/CVE-2019-12579.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12579", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12579", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The PIA Linux/macOS binary openvpn_launcher.64 binary is setuid root. This binary accepts several parameters to update the system configuration. These parameters are passed to operating system commands using a \"here\" document. The parameters are not sanitized, which allow for arbitrary commands to be injected using shell metacharacters. A local unprivileged user can pass special crafted parameters that will be interpolated by the operating system calls." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12579.txt", + "url": "https://github.com/mirchr/security-research/blob/master/vulnerabilities/PIA/CVE-2019-12579.txt" } ] } diff --git a/2019/4xxx/CVE-2019-4118.json b/2019/4xxx/CVE-2019-4118.json index 667c8659f3c..ad9f822a0c6 100644 --- a/2019/4xxx/CVE-2019-4118.json +++ b/2019/4xxx/CVE-2019-4118.json @@ -1,96 +1,96 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "3.1.0" - }, - { - "version_value" : "3.1.1" - }, - { - "version_value" : "3.1.2" - } - ] - }, - "product_name" : "Multicloud Manager" - } - ] - } - } - ] - } - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "value" : "IBM Multicloud Manager 3.1.0, 3.1.1, and 3.1.2 ibm-mcm-chart could allow a local attacker with admin privileges to obtain highly sensitive information upon deployment. IBM X-Force ID: 158144.", - "lang" : "eng" - } - ] - }, - "data_version" : "4.0", - "data_type" : "CVE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "3.1.0" + }, + { + "version_value": "3.1.1" + }, + { + "version_value": "3.1.2" + } + ] + }, + "product_name": "Multicloud Manager" + } + ] + } + } ] - } - ] - }, - "CVE_data_meta" : { - "DATE_PUBLIC" : "2019-07-08T00:00:00", - "ID" : "CVE-2019-4118", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC" - }, - "impact" : { - "cvssv3" : { - "BM" : { - "A" : "N", - "SCORE" : "4.400", - "UI" : "N", - "AC" : "L", - "C" : "H", - "AV" : "L", - "I" : "N", - "PR" : "H", - "S" : "U" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "references" : { - "reference_data" : [ - { - "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10885290", - "name" : "http://www.ibm.com/support/docview.wss?uid=ibm10885290", - "title" : "IBM Security Bulletin 885290 (Multicloud Manager)", - "refsource" : "CONFIRM" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/158144", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-mcm-cve20194118-info-disc (158144)", - "refsource" : "XF" - } - ] - } -} + } + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "value": "IBM Multicloud Manager 3.1.0, 3.1.1, and 3.1.2 ibm-mcm-chart could allow a local attacker with admin privileges to obtain highly sensitive information upon deployment. IBM X-Force ID: 158144.", + "lang": "eng" + } + ] + }, + "data_version": "4.0", + "data_type": "CVE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "DATE_PUBLIC": "2019-07-08T00:00:00", + "ID": "CVE-2019-4118", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" + }, + "impact": { + "cvssv3": { + "BM": { + "A": "N", + "SCORE": "4.400", + "UI": "N", + "AC": "L", + "C": "H", + "AV": "L", + "I": "N", + "PR": "H", + "S": "U" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "references": { + "reference_data": [ + { + "url": "http://www.ibm.com/support/docview.wss?uid=ibm10885290", + "name": "http://www.ibm.com/support/docview.wss?uid=ibm10885290", + "title": "IBM Security Bulletin 885290 (Multicloud Manager)", + "refsource": "CONFIRM" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158144", + "title": "X-Force Vulnerability Report", + "name": "ibm-mcm-cve20194118-info-disc (158144)", + "refsource": "XF" + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4131.json b/2019/4xxx/CVE-2019-4131.json index 60213501c3b..e26d50bf481 100644 --- a/2019/4xxx/CVE-2019-4131.json +++ b/2019/4xxx/CVE-2019-4131.json @@ -1,90 +1,90 @@ { - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Application Performance Management (IBM Monitoring 8.1.4) could allow a remote attacker to induce the application to perform server-side DNS lookups of arbitrary domain names. IBM X-Force ID: 158270." - } - ] - }, - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "description": { + "description_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "product_name" : "Monitoring", - "version" : { - "version_data" : [ - { - "version_value" : "8.1.4" - } - ] - } - } - ] - } + "lang": "eng", + "value": "IBM Application Performance Management (IBM Monitoring 8.1.4) could allow a remote attacker to induce the application to perform server-side DNS lookups of arbitrary domain names. IBM X-Force ID: 158270." } - ] - } - }, - "impact" : { - "cvssv3" : { - "BM" : { - "UI" : "N", - "A" : "N", - "SCORE" : "5.300", - "I" : "L", - "S" : "U", - "PR" : "N", - "C" : "N", - "AC" : "L", - "AV" : "N" - }, - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - } - } - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 957121 (Monitoring)", - "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10957121", - "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10957121" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-apm-cve20194131-dns (158270)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/158270" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Other" - } + ] + }, + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Monitoring", + "version": { + "version_data": [ + { + "version_value": "8.1.4" + } + ] + } + } + ] + } + } ] - } - ] - }, - "data_type" : "CVE", - "CVE_data_meta" : { - "ID" : "CVE-2019-4131", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-07-01T00:00:00" - } -} + } + }, + "impact": { + "cvssv3": { + "BM": { + "UI": "N", + "A": "N", + "SCORE": "5.300", + "I": "L", + "S": "U", + "PR": "N", + "C": "N", + "AC": "L", + "AV": "N" + }, + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + } + } + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 957121 (Monitoring)", + "name": "https://www.ibm.com/support/docview.wss?uid=ibm10957121", + "url": "https://www.ibm.com/support/docview.wss?uid=ibm10957121" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-apm-cve20194131-dns (158270)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158270" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Other" + } + ] + } + ] + }, + "data_type": "CVE", + "CVE_data_meta": { + "ID": "CVE-2019-4131", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-07-01T00:00:00" + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4193.json b/2019/4xxx/CVE-2019-4193.json index 4e8db185a91..7e9302c0cf5 100644 --- a/2019/4xxx/CVE-2019-4193.json +++ b/2019/4xxx/CVE-2019-4193.json @@ -1,93 +1,93 @@ { - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "1.1.3" - }, - { - "version_value" : "1.1.3.2" - } - ] - }, - "product_name" : "Jazz for Service Management" - } - ] - } - } - ] - } - }, - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "value" : "IBM Jazz for Service Management 1.1.3 and 1.1.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-force ID: 159032.", - "lang" : "eng" - } - ] - }, - "data_version" : "4.0", - "data_type" : "CVE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "1.1.3" + }, + { + "version_value": "1.1.3.2" + } + ] + }, + "product_name": "Jazz for Service Management" + } + ] + } + } ] - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2019-4193", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-07-05T00:00:00" - }, - "impact" : { - "cvssv3" : { - "BM" : { - "C" : "H", - "AC" : "H", - "AV" : "N", - "I" : "N", - "PR" : "N", - "S" : "U", - "A" : "N", - "SCORE" : "5.900", - "UI" : "N" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "references" : { - "reference_data" : [ - { - "refsource" : "CONFIRM", - "name" : "http://www.ibm.com/support/docview.wss?uid=ibm10885985", - "title" : "IBM Security Bulletin 0885985 (Jazz for Service Management)", - "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10885985" - }, - { - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/159032", - "refsource" : "XF", - "name" : "ibm-jazz-cve20194193-info-disc (159032)", - "title" : "X-Force Vulnerability Report" - } - ] - } -} + } + }, + "data_format": "MITRE", + "description": { + "description_data": [ + { + "value": "IBM Jazz for Service Management 1.1.3 and 1.1.3.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-force ID: 159032.", + "lang": "eng" + } + ] + }, + "data_version": "4.0", + "data_type": "CVE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2019-4193", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-07-05T00:00:00" + }, + "impact": { + "cvssv3": { + "BM": { + "C": "H", + "AC": "H", + "AV": "N", + "I": "N", + "PR": "N", + "S": "U", + "A": "N", + "SCORE": "5.900", + "UI": "N" + }, + "TM": { + "RL": "O", + "RC": "C", + "E": "U" + } + } + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "http://www.ibm.com/support/docview.wss?uid=ibm10885985", + "title": "IBM Security Bulletin 0885985 (Jazz for Service Management)", + "url": "http://www.ibm.com/support/docview.wss?uid=ibm10885985" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/159032", + "refsource": "XF", + "name": "ibm-jazz-cve20194193-info-disc (159032)", + "title": "X-Force Vulnerability Report" + } + ] + } +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4263.json b/2019/4xxx/CVE-2019-4263.json index 0308a90c973..0fda6cecc55 100644 --- a/2019/4xxx/CVE-2019-4263.json +++ b/2019/4xxx/CVE-2019-4263.json @@ -1,90 +1,90 @@ { - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM Content Navigator 3.0CD is vulnerable to local file inclusion, allowing an attacker to access a configuration file in the ICN server. IBM X-Force ID: 160015." - } - ] - }, - "data_format" : "MITRE", - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_version": "4.0", + "description": { + "description_data": [ { - "vendor_name" : "IBM", - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "3.0CD" - } - ] - }, - "product_name" : "Content Navigator" - } - ] - } + "lang": "eng", + "value": "IBM Content Navigator 3.0CD is vulnerable to local file inclusion, allowing an attacker to access a configuration file in the ICN server. IBM X-Force ID: 160015." } - ] - } - }, - "references" : { - "reference_data" : [ - { - "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10882412", - "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10882412", - "title" : "IBM Security Bulletin 882412 (Content Navigator)", - "refsource" : "CONFIRM" - }, - { - "refsource" : "XF", - "name" : "ibm-cn-cve20194263-info-disc (160015)", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/160015" - } - ] - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "U", - "RC" : "C", - "RL" : "O" - }, - "BM" : { - "I" : "N", - "PR" : "L", - "S" : "U", - "AC" : "L", - "C" : "L", - "AV" : "N", - "UI" : "N", - "A" : "N", - "SCORE" : "4.300" - } - } - }, - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2019-4263", - "DATE_PUBLIC" : "2019-07-01T00:00:00" - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } + ] + }, + "data_format": "MITRE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "3.0CD" + } + ] + }, + "product_name": "Content Navigator" + } + ] + } + } ] - } - ] - }, - "data_type" : "CVE" -} + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/docview.wss?uid=ibm10882412", + "name": "https://www.ibm.com/support/docview.wss?uid=ibm10882412", + "title": "IBM Security Bulletin 882412 (Content Navigator)", + "refsource": "CONFIRM" + }, + { + "refsource": "XF", + "name": "ibm-cn-cve20194263-info-disc (160015)", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160015" + } + ] + }, + "impact": { + "cvssv3": { + "TM": { + "E": "U", + "RC": "C", + "RL": "O" + }, + "BM": { + "I": "N", + "PR": "L", + "S": "U", + "AC": "L", + "C": "L", + "AV": "N", + "UI": "N", + "A": "N", + "SCORE": "4.300" + } + } + }, + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "ID": "CVE-2019-4263", + "DATE_PUBLIC": "2019-07-01T00:00:00" + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "Obtain Information", + "lang": "eng" + } + ] + } + ] + }, + "data_type": "CVE" +} \ No newline at end of file