René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

130 lines
4.0 KiB
JSON

{
"id": "CVE-2017-5427",
"sourceIdentifier": "security@mozilla.org",
"published": "2018-06-11T21:29:05.407",
"lastModified": "2018-08-07T18:06:07.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A non-existent chrome.manifest file will attempt to be loaded during startup from the primary installation directory. If a malicious user with local access puts chrome.manifest and other referenced files in this directory, they will be loaded and activated during startup. This could result in malicious software being added without consent or modification of referenced installed files. This vulnerability affects Firefox < 52."
},
{
"lang": "es",
"value": "Un archivo chrome.manifest inexistente intentar\u00e1 cargarse durante el arranque desde el directorio de instalaci\u00f3n primario. Si un usuario malicioso con acceso local coloca chrome.manifest y otros archivos referenciados en este directorio, se cargar\u00e1n y activar\u00e1n durante el arranque. Esto podr\u00eda resultar en que se a\u00f1adir\u00e1 software malicioso sin consentimiento o modificaci\u00f3n de archivos referenciados instalados. La vulnerabilidad afecta a Firefox en versiones anteriores a la 52."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 1.9
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "52.0",
"matchCriteriaId": "6239EC26-A3A1-4FD4-B96F-F47B09C0CA00"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/96692",
"source": "security@mozilla.org",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1037966",
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1295542",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2017-05/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}