2024-12-08 03:06:42 +00:00

132 lines
3.8 KiB
JSON

{
"id": "CVE-2005-4175",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-11T21:03:00.000",
"lastModified": "2024-11-21T00:03:37.997",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insyde BIOS V190 does not clear the keyboard buffer after reading the BIOS password during system startup, which allows local administrators or users to read the password directly from physical memory."
},
{
"lang": "es",
"value": "Insyde BIOS V190 no borra el b\u00fafer del teclado despu\u00e9s de leer la contrase\u00f1a de la BIOS durante el arranque del sistema, lo que permite a administradores o usuarios locales leer directamente la contrase\u00f1a de la memoria f\u00edsica."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insyde_bios:v190:*:*:*:*:*:*:*",
"matchCriteriaId": "12B464EA-B99F-4E76-97F6-9CD16B6F06D7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.ivizsecurity.com/preboot-patch.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/847537",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.pulltheplug.org/users/endrazine/Bios.Information.Leakage.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/419610/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15751",
"source": "cve@mitre.org"
},
{
"url": "http://www.ivizsecurity.com/preboot-patch.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.kb.cert.org/vuls/id/847537",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.pulltheplug.org/users/endrazine/Bios.Information.Leakage.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/419610/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15751",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}