2024-07-14 02:06:08 +00:00

133 lines
4.1 KiB
JSON

{
"id": "CVE-2003-0047",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-02-19T05:00:00.000",
"lastModified": "2016-10-18T02:28:45.217",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SSH2 clients for VanDyke (1) SecureCRT 4.0.2 and 3.4.7, (2) SecureFX 2.1.2 and 2.0.4, and (3) Entunnel 1.0.2 and earlier, do not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials."
},
{
"lang": "es",
"value": "Los clientes SSH2 de VanDyke SecureCRT 4.0.2 y 3.4.5, SecureFX 2.1.2 y 2.0.4, y Entunnel 1.02 y anteriores, no borran los credenciales de inicio de sesi\u00f3n de memoria, incluyendo contrase\u00f1as en texto claro, lo que podr\u00eda permitir a atacantes con acceso a memoria robar los credenciales SSH."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:van_dyke_technologies:entunnel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.2",
"matchCriteriaId": "503444E8-431B-48A9-BF7E-A8DD3FF47E0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:van_dyke_technologies:securecrt:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9F4B4CAB-77BB-49F4-B72D-C077DB8803B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:van_dyke_technologies:securecrt:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7CC992-1650-40C4-9465-A4B3DB6689C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:van_dyke_technologies:securefx:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1D6B50-6F7E-4750-BC24-22F823E34454"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:van_dyke_technologies:securefx:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0858A846-9044-4360-A214-A4F7785532CF"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=104386492422014&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.idefense.com/advisory/01.28.03.txt",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/6726",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/6727",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/6728",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1006010",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1006011",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1006012",
"source": "cve@mitre.org"
}
]
}