2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2017-13988" ,
2023-11-07 21:03:21 +00:00
"sourceIdentifier" : "security@opentext.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2017-09-30T01:29:01.287" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T02:38:48.850" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An improper access control vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows unauthorized users to alter the maximum size of storage groups and enable/disable the setting for the 'follow schedule' function."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de control de acceso incorrecto en ArcSight ESM y ArcSight ESM Express en cualquier versi\u00f3n 6.x anterior a la 6.9.1c Patch 4 o 6.11.0 Patch 1 permite que los usuarios sin autorizaci\u00f3n alteren el tama\u00f1o m\u00e1ximo de grupos de almacenamiento y habiliten/deshabiliten el ajuste para la funci\u00f3n 'follow schedule'."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D78B3322-5139-498E-881E-107A316BF27A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.0c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3EC0FEF9-75FC-4B80-949F-0D1BFFC77AE6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B6AAF29-51F6-424A-BE5A-AE886F12A707"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "10842D30-C2A4-48B5-BC1E-45A4B8C8D677"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "88A63A99-5FC1-4235-A390-3EAE61154B33"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.5c:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "60E11A80-D28D-47B9-83F3-045F33983797"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41658ED4-D03A-471C-9E83-A71B19229910"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.8c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4FB25793-D70A-4AC8-947A-3C2E153BDE9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.0c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D3F4F0A-B866-4DBC-8F83-5D558FF55E9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D902FDA0-B001-4C9A-82B8-2DA0554A599F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE8F1C31-174C-473C-BF0C-E2B25D35EBA0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "A53F2315-90FE-4722-99BF-ACD068E14837"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.9.1c:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "7662BB37-2990-4B2E-9444-DA2EC5EEA7D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager:6.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A04F201-32A6-43CA-A4D2-72E5D16B664A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3FC6544-94EA-407A-B2DE-B72FEB0D6B9F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.0c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF7EDBBF-A5E5-4142-9436-4203CF00AA3F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79A65366-9D30-47A3-914F-32E7D31442CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B7802C5-9294-4BD7-A0E6-8A240BC73EEE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9423B736-E39D-4FDE-A53D-F59D1A5F75FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.5c:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "8ABA543C-A5CB-48B8-A0FD-4909330E8795"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5112A04D-B67A-4006-87E2-8B59A05E0749"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.8c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4E444EC-4DFE-48A5-88E2-551D062C3A0E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "173D8141-F1E7-4C63-A22D-F33BE733EBC7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "836D66B2-2D0D-4AA6-8D26-1FB4B7136C93"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "24F1751D-5B62-4634-9619-7C572DC14C98"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "9AF52F9B-3A0E-42CE-A8E2-C6325041D2DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.9.1c:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D855C29-8407-4E77-8E25-6D4AA03F0859"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:arcsight_enterprise_security_manager_express:6.11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08AC0017-DBCA-4E8A-ACA0-34E845802D45"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.securityfocus.com/bid/100935" ,
2023-11-07 21:03:21 +00:00
"source" : "security@opentext.com"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://softwaresupport.hpe.com/km/KM02944672" ,
2023-11-07 21:03:21 +00:00
"source" : "security@opentext.com"
2023-04-24 12:24:31 +02:00
}
]
}