mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
270 lines
9.0 KiB
JSON
270 lines
9.0 KiB
JSON
{
|
|
"id": "CVE-2011-1126",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-04-04T12:27:38.157",
|
|
"lastModified": "2018-10-09T19:30:31.627",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "VMware vmrun, as used in VIX API 1.x before 1.10.3 and VMware Workstation 6.5.x and 7.x before 7.1.4 build 385536 on Linux, might allow local users to gain privileges via a Trojan horse shared library in an unspecified directory."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "VMware vmrun,como se utiliza en VIX API v1.x antes de v1.10.3 y VMware Workstation v6.5.x antes de v7.1.4 y v7.x compilaci\u00f3n 385536 en Linux podr\u00eda permitir a usuarios locales conseguir privilegios a trav\u00e9s de un caballo de Troya en una librer\u00eda compartida en un directorio especificado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.9
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ED1A8908-15AE-43AF-A1F1-D17A00BB8BDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD28C4F9-2B04-45AA-9A23-313892FBCCEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3F56B36-D0AA-4642-A35F-F2AD8A9AC82E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F80DE31-5B5D-41EF-9DC1-915AC88513A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "093CF496-09F2-4E2A-8B41-DD4B817704AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27E7EC42-023C-4536-B2DC-EC704337D73C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0DF7EE8C-AD9D-40D6-99A0-26758DB83EED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9FDEEE1-BC47-4EE6-A56B-C7626D554019"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98918409-9F58-4FBC-B5C1-4015B5E3C0FE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF0C3C01-6469-4985-A11F-EEF0BA71D6A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A06E17F-01B8-470C-B86C-A1BAB01E9C6E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E10DEC6-2798-4960-8946-3A1682CC2990"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:vix_api:1.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D78D8B5-400A-494E-A181-4ADBA8EB4246"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E8F3BFF-676B-4E2C-98BA-DCA71E49060F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3E658DA-56E8-49F0-B486-4EF622B63627"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "541D77A2-99C5-4CDB-877F-7E83E1E3369E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A6B53C0A-5A0C-4168-8AD3-F3E957AE8919"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3684F0D0-B8BE-442B-AA27-0A485E6BFFAF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:6.5.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A172221-19AB-4F7D-AA28-94AD5A6EFBF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AB33DBC9-3B63-457E-A353-B9E7378211AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34F436D4-B7B7-43CB-A2BD-C5E791F7E3C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF53DB66-4C79-47BB-AABD-6DCE2EF98E1E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13A31E93-7671-492E-A78F-89CF4703B04D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99ADA116-A571-4788-8DF2-09E8A2AF92F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2818FD22-8BC5-4803-8D62-D7C7C22556F9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.vmware.com/pipermail/security-announce/2011/000131.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8173",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1025270",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/517240/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/47094",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0006.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0816",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66472",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |