114 lines
4.0 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-11565",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-23T20:29:00.173",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "debian/tor.init in the Debian tor_0.2.9.11-1~deb9u1 package for Tor was designed to execute aa-exec from the standard system pathname if the apparmor package is installed, but implements this incorrectly (with a wrong assumption that the specific pathname would remain the same forever), which allows attackers to bypass intended AppArmor restrictions by leveraging the silent loss of this protection mechanism. NOTE: this does not affect systems, such as default Debian stretch installations, on which Tor startup relies on a systemd unit file (instead of this tor.init script)."
},
{
"lang": "es",
"value": "El archivo debian/tor.init en el paquete tor_0.2.9.11-1-deb9u1 de Debian para Tor, fue creado para ejecutar aa-exec desde el pathname (nombre de ruta) del sistema est\u00e1ndar si el paquete apparmor est\u00e1 instalado, pero implementa esto inapropiadamente (con una suposici\u00f3n inapropiada de que el pathname (nombre de ruta) espec\u00edfico sigue siendo el mismo siempre), lo que permite a los atacantes omitir las restricciones previstas de AppArmor mediante la explotaci\u00f3n de la p\u00e9rdida silenciosa de este mecanismo de protecci\u00f3n. NOTA: esto no afecta a los sistemas, como las instalaciones de extensi\u00f3n de Debian por defecto, en las que el inicio de Tor se basa en un archivo de unidad systemd (en lugar de este script tor.init)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:tor:0.2.9.11-1:*:*:*:*:*:*:*",
"matchCriteriaId": "B12F01E2-1A59-46EA-A9FF-C496412E41BD"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/99933",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugs.debian.org/869153",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
]
}
]
}