René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
3.8 KiB
JSON

{
"id": "CVE-2018-18059",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-24T17:29:02.147",
"lastModified": "2019-05-29T16:37:41.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Bitdefender Engines before 7.76675. A vulnerability has been discovered in the rar.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. Paired with other vulnerabilities, this can result in denial-of-service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file."
},
{
"lang": "es",
"value": "Fue encontrado un problema en Bitdefender Engines en versiones anteriores a la 7.76675. Una vulnerabilidad ha sido encontrada en el analizador rar.xmd que resulta de una falta de comprobaci\u00f3n adecuada de los datos suministrados por el usuario, lo que puede conllevar a una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Junto con otras vulnerabilidades, esto resultar\u00eda en una Denegaci\u00f3n de Servicios (DoS). La interacci\u00f3n del usuario es necesaria para explotar esta vulnerabilidad, ya que la v\u00edctima debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:scan_engines:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.76675",
"matchCriteriaId": "323EEA96-5B55-4E72-BA25-8FE6CD3C7154"
}
]
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.bitdefender.com/support/security-advisories/bitdefender-rar-xmd-rar-parsing-bounds-read-vulnerability/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}