125 lines
4.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-2157",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2017-05-12T18:29:00.920",
"lastModified": "2017-05-26T18:13:04.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in installers for The Public Certification Service for Individuals \"The JPKI user's software (for Windows 7 and later)\" Ver3.1 and earlier, The Public Certification Service for Individuals \"The JPKI user's software (for Windows Vista)\", The Public Certification Service for Individuals \"The JPKI user's software\" Ver2.6 and earlier that were available until April 27, 2017 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory."
},
{
"lang": "es",
"value": "Una vulnerabilidad de ruta (path) de b\u00fasqueda no confiable en los instaladores para El Servicio de Certificaci\u00f3n P\u00fablico para \"The JPKI user's software (for Windows 7 and later)\" individuales Versi\u00f3n 3.1 y anteriores, El Servicio de Certificaci\u00f3n P\u00fablico para \"The JPKI user's software (para Windows Vista)\" individuales, El Servicio de Certificaci\u00f3n P\u00fablico para \"The JPKI user's software\" individuales Versi\u00f3n 2.6 y anteriores que estuvieron disponibles hasta el 27 de abril de 2017 permite a los atacantes remotos alcanzar privilegios por medio de una DLL de tipo caballo de Troya en un directorio no especificado."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jpki:the_public_certification_service_for_individuals:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6",
"matchCriteriaId": "FAF6DA38-9883-45BF-80DE-68FD8269209A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jpki:the_public_certification_service_for_individuals:*:*:*:*:windows_7:*:*:*",
"versionEndIncluding": "3.1",
"matchCriteriaId": "302CAB38-93BF-413E-86D9-DCE51394560D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jpki:the_public_certification_service_for_individuals:-:*:*:*:windows_vista:*:*:*",
"matchCriteriaId": "5438913B-AB0E-48C0-8BFC-4EC83A35ABBC"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN39605485/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.jpki.go.jp/download/win.html#dl",
"source": "vultures@jpcert.or.jp",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}