{ "id": "CVE-2013-2069", "sourceIdentifier": "secalert@redhat.com", "published": "2013-05-29T00:55:01.133", "lastModified": "2018-12-06T21:01:14.503", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Red Hat livecd-tools before 13.4.4, 17.x before 17.17, 18.x before 18.16, and 19.x before 19.3, when a rootpw directive is not set in a Kickstart file, sets the root user password to empty, which allows local users to gain privileges." }, { "lang": "es", "value": "Red Hat livecd-tools anterior a v13.4.4, v17.x anterior a v17.17, v18.x anterior a v18.16, y v19.x anterior a v19.3, cuando una directiva rootpw no se encuentra en un fichero Kickstart, as\u00edgna una contrase\u00f1a vac\u00eda al usuario root permitiendo a usuarios locales obtener privilegios." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2 }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:livecd-tools:*:*:*:*:*:*:*:*", "versionEndExcluding": "13.4.4", "matchCriteriaId": "9D42EA10-B72C-47D2-9901-3CD548560412" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:livecd-tools:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.17", "matchCriteriaId": "8ECF4AA2-8F29-4875-ADF0-643F96191333" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:livecd-tools:*:*:*:*:*:*:*:*", "versionStartIncluding": "18.0", "versionEndExcluding": "18.16", "matchCriteriaId": "43EE8BA3-8F11-4456-B0F7-0EAF05469EF4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:livecd-tools:*:*:*:*:*:*:*:*", "versionStartIncluding": "19.0", "versionEndExcluding": "19.3", "matchCriteriaId": "9788C94D-3246-4A4E-90A9-B22B72E62A6B" } ] } ] } ], "references": [ { "url": "http://rhn.redhat.com/errata/RHSA-2013-0849.html", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/05/23/2", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/60119", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://aws.amazon.com/security/security-bulletins/red-hat-and-other-third-party-public-amis-security-concern/", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=964299", "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84488", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ] } ] }