revert files wrongfully changed

This commit is contained in:
ncsc-ch-vuln-mgmt 2022-07-12 17:44:32 +02:00
parent 8a62ad306a
commit dc38b4f169
2 changed files with 18 additions and 131 deletions

View File

@ -1,97 +1,18 @@
{
"CVE_data_meta": {
"AKA": "Retbleed",
"ASSIGNER": "vulnerability@ncsc.ch",
"ID": "CVE-2022-29900",
"STATE": "PUBLIC",
"TITLE": "Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AMD Microprocessor",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "15h to 18h"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Johannes Wikner - ETH Zürich"
},
{
"lang": "eng",
"value": "Kaveh Razavi - ETH Zürich"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-29000",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions."
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Information Exposure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://comsec.ethz.ch/retbleed",
"refsource": "CONFIRM",
"url": "https://comsec.ethz.ch/retbleed"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,9 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER": "vulnerability@ncsc.ch",
"ID": "CVE-2022-29901",
"STATE": "PUBLIC",
"TITLE": "Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)"
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-29001",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -12,33 +11,22 @@
"product": {
"product_data": [
{
"product_name": "Intel Microprocessors",
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "generations 6 to 8"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Intel"
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Johannes Wikner - ETH Zürich"
},
{
"lang": "eng",
"value": "Kaveh Razavi - ETH Zürich"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
@ -46,36 +34,17 @@
"description_data": [
{
"lang": "eng",
"value": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions."
"value": "In SpringBootMovie <=1.2, the uploaded file suffix parameter is not filtered, resulting in arbitrary file upload vulnerability"
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Information Exposure"
"value": "n/a"
}
]
}
@ -84,13 +53,10 @@
"references": {
"reference_data": [
{
"name": "https://comsec.ethz.ch/retbleed",
"refsource": "CONFIRM",
"url": "https://comsec.ethz.ch/retbleed"
"url": "https://github.com/lkmc2/SpringBootMovie/issues/4",
"refsource": "MISC",
"name": "https://github.com/lkmc2/SpringBootMovie/issues/4"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}