René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

126 lines
4.3 KiB
JSON

{
"id": "CVE-2018-17155",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2018-09-28T13:29:00.923",
"lastModified": "2018-11-23T14:08:35.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In FreeBSD before 11.2-STABLE(r338983), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338984), and 10.4-RELEASE-p13, due to insufficient initialization of memory copied to userland in the getcontext and swapcontext system calls, small amounts of kernel memory may be disclosed to userland processes. Unprivileged authenticated local users may be able to access small amounts privileged kernel data."
},
{
"lang": "es",
"value": "En FreeBSD, en versiones anteriores a 11.2-STABLE(r338983), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338984) y 10.4-RELEASE-p13, debido a la insuficiente inicializaci\u00f3n de la memoria copiada al espacio de usuario en las llamadas del sistema getcontext y swapcontext, podr\u00edan divulgarse peque\u00f1as cantidades de memoria del kernel al proceso del espacio de usuario. Los usuarios locales autenticados sin privilegios podr\u00edan ser capaces de acceder peque\u00f1as cantidades de datos privilegiados del kernel."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2",
"matchCriteriaId": "B7354D16-6431-43C2-97BA-EBBF482572C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BD5B9266-A927-4F62-8742-721CE9A4C4C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:10.4:p13:*:*:*:*:*:*",
"matchCriteriaId": "86FDD601-4F89-4CA3-BE1A-54EA02DAC008"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:11.1:p15:*:*:*:*:*:*",
"matchCriteriaId": "17D3DDDC-07B4-43ED-8E0B-FF2D293B0EE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*",
"matchCriteriaId": "22365F7C-2B00-4B61-84E8-EFBA3B8CFDC0"
}
]
}
]
}
],
"references": [
{
"url": "https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.asc",
"source": "secteam@freebsd.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}