2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2011-2658" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2012-07-26T22:55:01.217" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T01:28:42.330" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The ISList.ISAvi ActiveX control in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 provides access to the mscomct2.ocx file, which allows remote attackers to execute arbitrary code by leveraging unspecified mscomct2 flaws."
} ,
{
"lang" : "es" ,
"value" : "El control ActiveX ISList.ISAvi en AdminStudio en Novell ZENworks Configuration Management (ZCM) v10.2, v10.3, 11 y SP1 permite el acceso al expediente Mscomct2.ocx, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n aprovech\u00e1ndose de fallos no especificados de mscomct2.\r\n"
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BCFE6AD-E242-4306-8DEB-7023F48BC1D3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0ABC25E5-76CD-469B-879A-B1F7109D0181"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A93DBC3-5C82-4396-B3D0-F32B219E2DE0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.novell.com/support/kb/doc.php?id=7009570" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-317/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www.novell.com/support/kb/doc.php?id=7009570" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-317/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2023-04-24 12:24:31 +02:00
}
]
}