René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

104 lines
3.2 KiB
JSON

{
"id": "CVE-2011-2657",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-07-26T22:55:01.090",
"lastModified": "2012-07-27T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument."
},
{
"lang": "es",
"value": "Una vulnerabilidad de salto de directorio en la funci\u00f3n LaunchProcess en el control ActiveX LaunchHelp.HelpLauncher.1 en LaunchHelp.dll en AdminStudio en Novell ZENworks Configuration Management (ZCM) v10.2, v10.3, 11 y SP1 permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s de una ruta en el primer argumento.\r\n"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4BCFE6AD-E242-4306-8DEB-7023F48BC1D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABC25E5-76CD-469B-879A-B1F7109D0181"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*",
"matchCriteriaId": "9A93DBC3-5C82-4396-B3D0-F32B219E2DE0"
}
]
}
]
}
],
"references": [
{
"url": "http://www.exploit-db.com/exploits/19718/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.novell.com/support/kb/doc.php?id=7009570",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-318/",
"source": "cve@mitre.org"
}
]
}