mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
167 lines
5.4 KiB
JSON
167 lines
5.4 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2016-0380",
|
||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||
|
"published": "2016-08-08T01:59:05.633",
|
||
|
"lastModified": "2020-06-25T19:42:45.090",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "IBM Sterling Connect:Direct for Unix 4.1.0 before 4.1.0.4 iFix073 and 4.2.0 before 4.2.0.4 iFix003 uses default file permissions of 0664, which allows local users to obtain sensitive information via standard filesystem operations."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "IBM Sterling Connect:Direct para Unix 4.1.0 en versiones anteriores a 4.1.0.4 iFix073 y 4.2.0 en versiones anteriores a 4.2.0.4 iFix003 utiliza permisos de archivo predeterminado de 0664, lo que permite a usuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de operaciones est\u00e1ndares de sistema de archivos."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
|
"attackVector": "LOCAL",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 3.3,
|
||
|
"baseSeverity": "LOW"
|
||
|
},
|
||
|
"exploitabilityScore": 1.8,
|
||
|
"impactScore": 1.4
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 2.1
|
||
|
},
|
||
|
"baseSeverity": "LOW",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-264"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.1.0.0:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "015B9524-6932-4834-A3BB-985BB04C2FC3"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.1.0.1:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "4959E4CB-F87B-44CE-8FD2-F336DB1F4998"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.1.0.2:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "31CA7220-2523-4EDC-A98A-EA9DADE78EE6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.1.0.3:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "166AA44D-1243-4F14-BF41-CD125D234AC2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.1.0.4:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "281C2BEF-3C83-45C6-83EE-B5EE2B1BE817"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.2.0.0:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "B6EE8089-7D2A-479D-9DE4-0E0DAC8F2540"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.2.0.1:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "C7AE27EC-ED46-4B3F-9E4F-13FCA9A4E00E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.2.0.2:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "CE00C5BB-3466-41AC-87DB-09C8E081643D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.2.0.3:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "BD011827-8FE3-4C5C-9653-64FA90210B27"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:ibm:sterling_connect\\:direct:4.2.0.4:*:*:*:*:unix:*:*",
|
||
|
"matchCriteriaId": "B9A75F26-B8CB-4EEB-A4B0-F11A9E48B1AD"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT14769",
|
||
|
"source": "psirt@us.ibm.com",
|
||
|
"tags": [
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988278",
|
||
|
"source": "psirt@us.ibm.com",
|
||
|
"tags": [
|
||
|
"Mitigation",
|
||
|
"Patch",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/92336",
|
||
|
"source": "psirt@us.ibm.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory",
|
||
|
"VDB Entry"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|