118 lines
3.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-7884",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-06-16T13:29:00.187",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In Adam Kropelin adk0212 APC UPS Daemon through 3.14.14, the default installation of APCUPSD allows a local authenticated, but unprivileged, user to run arbitrary code with elevated privileges by replacing the service executable apcupsd.exe with a malicious executable that will run with SYSTEM privileges at startup. This occurs because of \"RW NT AUTHORITY\\Authenticated Users\" permissions for %SYSTEMDRIVE%\\apcupsd\\bin\\apcupsd.exe."
},
{
"lang": "es",
"value": "En Demonio APC UPS hasta versi\u00f3n 3.14.14 de Adam Kropelin adk0212 , la instalaci\u00f3n por defecto de APCUPSD permite que un usuario identificado local, pero no privilegiado, ejecute c\u00f3digo arbitrario con privilegios elevados al reemplazar el servicio ejecutable apcupsd.exe con un ejecutable malicioso que se ejecutar\u00e1 con privilegios SYSTEM en el inicio. Esto ocurre debido a los permisos \"RW NT AUTHORITY\\Authenticated Users\" para %SYSTEMDRIVE%\\apcupsd\\bin\\apcupsd.exe."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apcupsd:apc_ups_daemon:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.14.14",
"matchCriteriaId": "58E8B12B-0578-4783-9B68-3E6BAEBF7EA0"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2017/Jun/20",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/99092",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1038707",
"source": "cve@mitre.org"
}
]
}