229 lines
7.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2008-3246",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-07-21T16:41:00.000",
"lastModified": "2024-11-21T00:48:47.880",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the PDF distiller component in the BlackBerry Attachment Service in BlackBerry Unite! 1.0 SP1 (1.0.1) before bundle 36 and BlackBerry Enterprise Server 4.1 SP3 (4.1.3) through 4.1 SP5 (4.1.5) allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file attachment."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en el componente PDF distiller en el BlackBerry Attachment Service en BlackBerry Unite! 1.0 SP1 (1.0.1) anterior a bundle 36 y BlackBerry Enterprise Server 4.1 SP3 (4.1.3) a la v4.1 SP5 (4.1.5), permite atacantes remotos asistidos por el usuario ejecutar c\u00f3digod e su elecci\u00f3n a trav\u00e9s de un fichero PDF adjunto manipulado."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blackberry:enterprise_server:4.1:sp3:*:*:*:*:*:*",
"matchCriteriaId": "1B8B0D10-A7DD-4D8A-B994-6A41FD7AA8C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blackberry:enterprise_server:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "014E79FB-0E10-4BEF-9618-F436A6CF3F57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blackberry:enterprise_server:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B0D729-6092-4A9C-ADE6-2D770417891F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blackberry:enterprise_server:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "965CD573-84C1-4456-9C28-6FBD9B0596A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blackberry:unite:1.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "90B1FF3F-4FF8-409F-B93B-39423FD34CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blackberry:unite:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D2A93A7-823C-48BF-A421-37524CF8DC68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_enterprise_server:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BD344A-EE9C-4ECB-8CB1-35146FD6F056"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_enterprise_server:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B1694E42-9AA5-4503-9714-CBDE388481A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_enterprise_server:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "16F378AF-E25B-4D60-AF7E-9E6FB228BF1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_enterprise_server_for_domino:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C53C3B7A-7C80-478C-9D69-B9C22D84B48C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_enterprise_server_for_exchange:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3B5350-5796-47F1-B2D1-E8AC86D28C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_enterprise_server_for_novell_groupwise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C218F357-9BA3-48E7-AD07-8E7A7B70ECAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_unite:1.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "BB792C74-CD6A-4903-8D11-59B0393F74CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rim:blackberry_unite:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF3712A-46BB-4DC1-947F-228EEF5DBAB9"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/31092",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/31141",
"source": "cve@mitre.org"
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.blackberry.com/btsc/articles/635/KB15770_f.SAL_Public.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.blackberry.com/btsc/articles/660/KB15766_f.SAL_Public.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/289235",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1020505",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2108/references",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43840",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43843",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/31092",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/31141",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.blackberry.com/btsc/articles/635/KB15770_f.SAL_Public.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.blackberry.com/btsc/articles/660/KB15766_f.SAL_Public.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/289235",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securitytracker.com/id?1020505",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2108/references",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43840",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43843",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}