mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
194 lines
9.1 KiB
JSON
194 lines
9.1 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-1188",
|
|
"ASSIGNER": "secure@microsoft.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nThe attacker could present to the user a removable drive, or remote share, that contains a malicious .LNK file and an associated malicious binary. When the user opens this drive(or remote share) in Windows Explorer, or any other application that parses the .LNK file, the malicious binary will execute code of the attacker\u2019s choice, on the target system.\nThe security update addresses the vulnerability by correcting the processing of shortcut LNK references.\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Remote Code Execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Microsoft",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Windows 10 Version 1803",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server, version 1803 (Server Core Installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows 10 Version 1809",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2019",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2019 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows 10 Version 1709 for 32-bit Systems",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows 10 Version 1709",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows 10 Version 1903 for 32-bit Systems",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows 10 Version 1903 for x64-based Systems",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows 10 Version 1903 for ARM64-based Systems",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server, version 1903 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1188",
|
|
"refsource": "MISC",
|
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1188"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseSeverity": "HIGH",
|
|
"baseScore": 7.5,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C"
|
|
}
|
|
]
|
|
}
|
|
} |