mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
98 lines
3.0 KiB
JSON
98 lines
3.0 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2003-0546",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2003-08-27T04:00:00.000",
|
||
|
"lastModified": "2017-10-11T01:29:11.293",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote attackers to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "up2date 3.0.7 3.1.23 no verifica adecuadamente firmas RPM GPG, lo que podr\u00eda permitir a atacantes remotos instalar paquetes sin firmar de la Red Hat Network, si esa red queda comprometida."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "PARTIAL",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "PARTIAL",
|
||
|
"baseScore": 7.5
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 6.4,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": true,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:redhat:up2date:3.0.7-1:*:i386:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EF04F053-8845-4599-A238-6D4B729A558D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:redhat:up2date:3.0.7-1:*:i386_gnome:*:*:*:*:*",
|
||
|
"matchCriteriaId": "8A584844-43A9-486A-8E4E-8D20CBD34B8E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:redhat:up2date:3.1.23-1:*:i386:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B0238C23-FDB9-4E7B-980C-39AA99AC81F0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:redhat:up2date:3.1.23-1:*:i386_gnome:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6B9C6FBD-59FA-4420-B159-48094905668A"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://marc.info/?l=bugtraq&m=106036724315539&w=2",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A631",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|