mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
89 lines
3.4 KiB
JSON
89 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2011-1652",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-04-06T17:55:01.007",
|
|
"lastModified": "2023-11-07T02:07:03.967",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The default configuration of Microsoft Windows 7 immediately prefers a new IPv6 and DHCPv6 service over a currently used IPv4 and DHCPv4 service upon receipt of an IPv6 Router Advertisement (RA), and does not provide an option to ignore an unexpected RA, which allows remote attackers to conduct man-in-the-middle attacks on communication with external IPv4 servers via vectors involving RAs, a DHCPv6 server, and NAT-PT on the local network, aka a \"SLAAC Attack.\" NOTE: it can be argued that preferring IPv6 complies with RFC 3484, and that attempting to determine the legitimacy of an RA is currently outside the scope of recommended behavior of host operating systems"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "**EN DISPUTA** La configuraci\u00f3n por defecto de Microsoft Windows 7 inmediatamente selecciona servicios IPv6 y DHCPv6 sobre los servicios IPv4 e DHCPv4 que usa actualmente una vez recibido de ruter una trama de aviso de router (AR), y no proporciona una opci\u00f3n para ignorar un AR, lo que permite a atacantes remotos para realizar ataques \"man-in-the-middle en la comunicaci\u00f3n con servidores externos IPv4 a trav\u00e9s de vectores participaci\u00f3n que impliquen RA, en un servidor DHCPv6 y NAT-PT en la red local, tambi\u00e9n conocido como ataque \"SLAAC\". NOTA: se puede argumentar que se prefiere IPv6 que cumpla con RFC 3484, y que intenta determinar la legitimidad de un RA est\u00e1 actualmente fuera del \u00e1mbito de la conducta recomendada de los sistemas operativos anfitriones."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-16"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://resources.infosecinstitute.com/slaac-attack/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.immunityinc.com/pipermail/dailydave/20110404/000122.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
}
|
|
]
|
|
} |