134 lines
4.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2018-1269",
"sourceIdentifier": "security_alert@emc.com",
"published": "2018-06-06T20:29:00.550",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not handle errors thrown while constructing certain http requests. A remote authenticated user may construct malicious requests to cause the traffic controller to leave dangling TCP connections, which could cause denial of service."
},
{
"lang": "es",
"value": "Cloud Foundry Loggregator, en versiones 89.x anteriores a la 89.5, versiones 96.x anteriores a la 96.1, versiones 99.x anteriores a la 99.1, versiones 101.x anteriores a la 101.9 o versiones 102.x anteriores a la 102.2, no gestiona los errores que se lanzan cuando se construyen ciertas peticiones http. Un usuario autenticado remoto podr\u00eda construir peticiones maliciosas para provocar que el controlador de tr\u00e1fico deje pendientes las conexiones TCP, lo que podr\u00eda provocar una denegaci\u00f3n de servicio (DoS)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "89",
"versionEndExcluding": "89.5",
"matchCriteriaId": "3A0DC6EA-38C5-4401-9696-035B821D538C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "96",
"versionEndExcluding": "96.1",
"matchCriteriaId": "DD35ED5D-74D8-45ED-B0A3-21E2A1A7ABDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "99",
"versionEndExcluding": "99.1",
"matchCriteriaId": "1E20F6DA-281F-42F9-B50E-4ACD4EBAF4A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "101",
"versionEndExcluding": "101.9",
"matchCriteriaId": "F9DECBA2-12CD-4705-914A-2A59B823B096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:loggregator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "102",
"versionEndExcluding": "102.2",
"matchCriteriaId": "17830EE4-E342-453F-9ABC-D0E60BDBEB76"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cloudfoundry.org/blog/cve-2018-1269",
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory"
]
}
]
}