2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-7279" ,
2023-11-07 21:03:21 +00:00
"sourceIdentifier" : "trellixpsirt@trellix.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2020-06-10T12:15:11.383" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:25:50.663" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "DLL Search Order Hijacking Vulnerability in the installer component of McAfee Host Intrusion Prevention System (Host IPS) for Windows prior to 8.0.0 Patch 15 Update allows attackers with local access to execute arbitrary code via execution from a compromised folder."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de Secuestro de \u00d3rdenes de B\u00fasqueda de DLL en el componente installer de McAfee Host Intrusion Prevention System (Host IPS) para Windows versiones anteriores a 8.0.0 Parche 15 Update, permite a atacantes con acceso local ejecutar c\u00f3digo arbitrario mediante una ejecuci\u00f3n desde una carpeta comprometida"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
{
2023-11-07 21:03:21 +00:00
"source" : "01626437-bf8f-4d1c-912a-893b5eb04808" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.6 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 0.3 ,
"impactScore" : 4.2
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:M/Au:N/C:P/I:P/A:P" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 4.4
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.4 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-426"
}
]
} ,
{
2023-11-07 21:03:21 +00:00
"source" : "01626437-bf8f-4d1c-912a-893b5eb04808" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-426"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:-:*:*:*:windows:*:*" ,
"matchCriteriaId" : "D29F5F35-ED8B-4163-B51A-3A6ED8D34AF0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p1:*:*:*:windows:*:*" ,
"matchCriteriaId" : "812EFDC0-EC1C-484D-8F00-33DE2FD05877"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p10:*:*:*:windows:*:*" ,
"matchCriteriaId" : "BF8F5CAC-AB88-4F6C-833C-D67A7F3F0AD4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p11:*:*:*:windows:*:*" ,
"matchCriteriaId" : "813020FB-4321-4ED1-BCDB-703E27593279"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p12:*:*:*:windows:*:*" ,
"matchCriteriaId" : "E1FF1226-355B-44C1-BBED-487CF5983D00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p13:*:*:*:windows:*:*" ,
"matchCriteriaId" : "A1B6BAE8-8F23-4CEC-B6A4-83013A68DE5A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p14:*:*:*:windows:*:*" ,
"matchCriteriaId" : "BB126816-CC02-42C4-A989-F1851CC61897"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p15:*:*:*:windows:*:*" ,
"matchCriteriaId" : "5C726287-2376-4DF4-9D0C-DE48E2817DA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p2:*:*:*:windows:*:*" ,
"matchCriteriaId" : "88D2074F-ACDD-439C-8510-D1CC71B75964"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p3:*:*:*:windows:*:*" ,
"matchCriteriaId" : "40400B28-8CE4-4C25-84A4-0F7A75E6BBED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p4:*:*:*:windows:*:*" ,
"matchCriteriaId" : "AD6376B5-5495-4667-9DB7-8AB8C82D3A22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p5:*:*:*:windows:*:*" ,
"matchCriteriaId" : "D61448FA-F1FA-459F-844D-F2939CFF68EB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p6:*:*:*:windows:*:*" ,
"matchCriteriaId" : "C4087786-B1F1-41B5-B9A6-CD74FA29A3C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p7:*:*:*:windows:*:*" ,
"matchCriteriaId" : "AA8CEC96-498C-4FA4-8DE2-1157341DF630"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p8:*:*:*:windows:*:*" ,
"matchCriteriaId" : "CFC44C55-8C5D-49A8-8FE3-4976CD73D18C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mcafee:host_intrusion_prevention:8.0.0:p9:*:*:*:windows:*:*" ,
"matchCriteriaId" : "0EC11722-2265-4E0E-9B16-1692B03B5850"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10320" ,
2023-11-07 21:03:21 +00:00
"source" : "trellixpsirt@trellix.com"
2023-04-24 12:24:31 +02:00
}
]
}