René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

114 lines
4.5 KiB
JSON

{
"id": "CVE-2017-3242",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2017-01-27T22:59:02.397",
"lastModified": "2017-01-31T02:59:02.917",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle VM Server for Sparc component of Oracle Sun Systems Products Suite (subcomponent: LDOM Manager). Supported versions that are affected are 3.2 and 3.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM Server for Sparc executes to compromise Oracle VM Server for Sparc. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM Server for Sparc, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM Server for Sparc. CVSS v3.0 Base Score 5.9 (Availability impacts)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Oracle VM Server for Sparc de Oracle Sun Systems Products Suite (subcomponente: LDOM Manager). Versiones compatibles que est\u00e1n afectadas son 3.2 y 3.4. Vulnerabilidad f\u00e1cilmente explotable permite a atacante poco privilegiado con inicio de sesi\u00f3n a la infraestructura donde se ejecuta Oracle VM Server for Sparc, comprometer Oracle VM Server for Sparc. Ataques exitosos requieren interacci\u00f3n humana de una persona distinta del atacante y mientras la vulnerabilidad est\u00e9 en Oracle VM Server for Sparc, los ataques podr\u00edan afectar significativamente a productos adicionales. Ataques exitosos de esta vulnerabilidad pueden resultar en capacidad no autorizada para provocar un cuelgue o bloqueo frecuentemente repetible (DOS completo) de Oracle VM Server for Sparc. CVSS v3.0 Base Score 5.9 (Impactos de disponibilidad)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:sparc:*",
"matchCriteriaId": "8BA52C8E-8A65-497A-9DE6-54342FCC5A10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:sparc:*",
"matchCriteriaId": "F2A7DE34-BFA5-407A-B99D-DFD1295CA9B5"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/95541",
"source": "secalert_us@oracle.com"
}
]
}