mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
126 lines
4.1 KiB
JSON
126 lines
4.1 KiB
JSON
{
|
|
"id": "CVE-2011-1867",
|
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
|
"published": "2011-07-11T20:55:01.130",
|
|
"lastModified": "2018-10-09T19:32:08.040",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Stack-based buffer overflow in iNodeMngChecker.exe in the User Access Manager (UAM) 5.0 before SP1 E0101P03 and Endpoint Admission Defense (EAD) 5.0 before SP1 E0101P03 components in HP Intelligent Management Center (aka iNode Management Center) allows remote attackers to execute arbitrary code via a 0x0A0BF007 packet."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer basado en pila en iNodeMngChecker.exe en el User Access Manager (UAM ) v5.0 antes de SP1 E0101P03 y Endpoint Admission Defense(EAD )v5.0 antes de SP1 E0101P03,componentes de HP Intelligent Management Center (tambi\u00e9n conocido como iNode Management Center), permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete 0x0A0BF007.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:endpoint_admission_defense:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "22ED175D-A113-4072-82C3-69000AAA0F49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:endpoint_admission_defense:5.0:e0101:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3AA1C8F6-AC80-4E09-AED8-75462E2C94F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BDC88AFF-1BE1-453D-ACCF-A673A51F398B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:user_access_manager:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7EDEA50-06F9-45A1-BD2C-4D0DD512ED03"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hp:user_access_manager:5.0:e0101:*:*:*:*:*:*",
|
|
"matchCriteriaId": "940B190C-30F7-4360-BB0B-B3E5BEB03A98"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=130982758604404&w=2",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8302",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1025740",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/518691/100/0/threaded",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/48527",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-232/",
|
|
"source": "hp-security-alert@hp.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68348",
|
|
"source": "hp-security-alert@hp.com"
|
|
}
|
|
]
|
|
} |