104 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-14688",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-09-22T08:29:00.193",
"lastModified": "2017-10-03T17:05:22.873",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .djvu file, related to a \"Read Access Violation starting at STDUDjVuFile!DllUnregisterServer+0x000000000000d917.\""
},
{
"lang": "es",
"value": "La versi\u00f3n 1.6.375 de STDU Viewer permite que los atacantes provoquen una denegaci\u00f3n de servicio o, posiblemente, otro impacto sin especificar mediante un archivo .djvu manipulado. Esta vulnerabilidad est\u00e1 relacionada con \"Read Access Violation starting at STDUDjVuFile!DllUnregisterServer+0x000000000000d917\"."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*",
"matchCriteriaId": "9E841F3F-38C6-4A73-887F-7A77251C4A4E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14688",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}