130 lines
3.9 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-7435",
"sourceIdentifier": "security@opentext.com",
2023-04-24 12:24:31 +02:00
"published": "2018-03-01T20:29:00.617",
"lastModified": "2023-11-07T02:50:08.320",
2023-04-24 12:24:31 +02:00
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system."
},
{
"lang": "es",
"value": "En libzypp, en versiones anteriores a la 20170803, fue posible a\u00f1adir repositorios YUM no firmados sin avisar al usuario. Esto pod\u00eda resultar en que un atacante Man-in-the-Middle (MitM) o servidores maliciosos inyectasen paquetes RPM maliciosos en el sistema de un usuario."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "security@opentext.com",
2023-04-24 12:24:31 +02:00
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opensuse:libzypp:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.15.2",
"matchCriteriaId": "4CAACEA3-7214-40A7-B212-DE6BED99F2C7"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1009127",
"source": "security@opentext.com"
2023-04-24 12:24:31 +02:00
},
{
"url": "https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html",
"source": "security@opentext.com"
2023-04-24 12:24:31 +02:00
},
{
"url": "https://www.suse.com/de-de/security/cve/CVE-2017-7435/",
"source": "security@opentext.com"
2023-04-24 12:24:31 +02:00
}
]
}