mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
288 lines
11 KiB
JSON
288 lines
11 KiB
JSON
{
|
|
"id": "CVE-2011-2993",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-08-18T18:55:02.023",
|
|
"lastModified": "2017-09-19T01:33:29.993",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La implementaci\u00f3n de firmas digitales para archivos JAR en Firefox versiones 4.x hasta 5, SeaMonkey versiones 2.x anteriores a 2.3, de Mozilla, y posiblemente otros productos no impide las llamadas de c\u00f3digo JavaScript sin firmar en c\u00f3digo firmado, lo que permite a los atacantes remotos omitir la Pol\u00edtica del Mismo Origen y alcanzar privilegios por medio de un sitio web especialmente dise\u00f1ado, una vulnerabilidad diferente de CVE-2008-2801."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C69962C4-FA56-47F2-82A4-DFF4C19DAF3A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7BC1684-3634-4585-B7E6-8C8777E1DA0D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A490D040-EF74-45C2-89ED-D88ADD222712"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6CDA17D1-CD93-401E-860C-7C3291FEEB7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F72FDE3-54E0-48E4-9015-1B8A36DB1EC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4062C901-3828-415B-A6C3-EDD0E7B20C0E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC0D8730-7034-4AD6-9B05-F8BAFB0145EF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "857AFB05-F0C1-4061-9680-9561D68C908F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EC37EBAF-C979-4ACC-ACA9-BDC2AECCB0D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80801CD8-EEAF-4BC4-9085-DCCC6CF73076"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FAF4C78A-5093-4871-AF69-A8E8FD7E1AAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "560AD4C7-89D2-4323-BBCC-A89EEB6832CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B389CBC-4F6C-4C17-A87B-A6DD92703A10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DDFBA043-91BC-4FB5-A34D-FCE1A9C65A88"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8901A808-66F1-4501-AFF6-6FBB22852855"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58EB8E8A-84DE-43AA-B8F0-B585FB73D724"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C19C0BF7-390D-4E2E-BA32-28DFF73C55F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5FE5E50C-80ED-4CA7-BC85-8BD2E324D527"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEBF912C-A12E-4DBD-84AC-8B440E190BCE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B8EDED6-29EF-4A9F-955D-F5E6611C2141"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDC9C82D-586A-48F4-B540-1E2AE79806B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51FCF83B-630A-4413-BFAA-0C24A6B8F4F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84B2AA0A-0220-49DD-82CD-37FDC563F146"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D754AF10-1E43-46C8-A444-E7DB3401509D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34182167-F1DF-455B-BFDB-0A8491590479"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8ECA6CE-20D0-4A4F-B376-888A9328B044"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FEFCAB0-E57A-46E8-94C7-8510BB87C6B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9FB5C972-AF7B-4EC7-BCE5-867CACCF5C19"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C68DBB31-7804-446E-9A53-073E4B74E851"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31ADCC51-CE05-4EB6-BE8F-B64FD62946A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "387390AE-CF25-47ED-BD36-F42455DE1A4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78D5F0AD-9974-40A1-942F-0F03A278DAD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C388E6F-148E-4EA5-8D82-7778398122BA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F1FEB21-60B1-4303-BE19-576CC93B940C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "635FCE4C-2D15-4FB2-8917-D176B1539024"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E59E74C2-38F2-4B7F-88C0-9919548713B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB6663ED-4643-4BB7-B281-706C7A0E10F3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-29.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.mozilla.org/security/announce/2011/mfsa2011-33.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=657267",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14055",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |