mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 17:51:17 +00:00
114 lines
3.8 KiB
JSON
114 lines
3.8 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2017-17840",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2017-12-27T17:08:19.623",
|
||
|
"lastModified": "2018-01-11T18:52:46.897",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Se ha descubierto un problema en versiones hasta la 2.0.875 de Open-iSCSI. Un atacante local puede provocar que el servidor iscsiuio se interrumpa o, posiblemente, ejecute c\u00f3digo mediante el env\u00edo de mensajes con longitudes incorrectas. Debido a la falta de verificaci\u00f3n, esto puede dar lugar a desbordamientos de b\u00fafer que den como resultado interrupciones (con la verificaci\u00f3n de desbordamiento activada) o ejecuci\u00f3n de c\u00f3digo. La funci\u00f3n process_iscsid_broadcast en iscsiuio/src/unix/iscsid_ipc.c no valida la longitud de la carga \u00fatil antes de una operaci\u00f3n de escritura."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV30": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.0",
|
||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "LOCAL",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 7.8,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 1.8,
|
||
|
"impactScore": 5.9
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 4.6
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-119"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:open-iscsi_project:open-iscsi:*:*:*:*:*:*:*:*",
|
||
|
"versionEndIncluding": "2.0.875",
|
||
|
"matchCriteriaId": "D0807E98-96E5-420F-8197-15F381454CC2"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://www.openwall.com/lists/oss-security/2017/12/13/2",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Mailing List",
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://bugzilla.opensuse.org/show_bug.cgi?id=1072312",
|
||
|
"source": "cve@mitre.org",
|
||
|
"tags": [
|
||
|
"Issue Tracking",
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|