mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
280 lines
11 KiB
JSON
280 lines
11 KiB
JSON
{
|
|
"id": "CVE-2020-5316",
|
|
"sourceIdentifier": "security_alert@emc.com",
|
|
"published": "2021-07-22T17:15:08.417",
|
|
"lastModified": "2021-08-02T15:15:46.337",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dell SupportAssist for Business PCs versiones 2.0, 2.0.1, 2.0.2, 2.1, 2.1.2, 2.1.3 y Dell SupportAssist for Home PCs versiones 2.0, 2.0.1, 2.0.2, 2.1, 2.1. 1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4, contienen una vulnerabilidad de b\u00fasqueda de ruta no controlada. Un usuario poco privilegiado autenticado localmente podr\u00eda explotar esta vulnerabilidad para causar la carga de DLL arbitrarias por parte de los binarios de SupportAssist, resultando en una ejecuci\u00f3n privilegiada de c\u00f3digo arbitrario"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "security_alert@emc.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 4.6
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-427"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "security_alert@emc.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-427"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BC3859C-3FC5-44F5-A3DB-0745DAD22EB4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCB902B3-9139-4B4B-99D6-853DDE5C4C16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A236294-5A7E-4092-BC44-07160220614C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C8A1FEE-CB75-406F-9A2E-AEB20D280281"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DD9BCEB-29C1-45AF-AD02-D4C885CD84B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49452E40-A61A-43AF-8908-558F53AB7A1D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4C0C4A81-093B-40D4-B708-7B4652D4A817"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47498FB7-A097-4D5E-A4BC-C141CD47AA12"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "69AB75F7-08BF-4B13-9071-2302D913F8AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94855B56-371F-4DB8-B5AC-375B9623C1C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCE0D10F-BDF6-4EFB-94EA-58DB3E76D8EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "92828A92-D9DF-4BF3-B4CA-5328D3A2B035"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBE24202-57B4-43C0-B38B-A809F535C3A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82801073-20E7-46B9-9B58-BB340E6B1161"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7DE7F09-E1B0-483D-8241-F651CF8E8572"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C8F4A0F-E438-4F2E-8A33-187CE75FAB4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB974920-8A37-4F63-80E6-09EFDBAFDDFF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FCFCE04-A041-46C0-BF79-E3A22FAC60BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "73C0307A-C79B-4262-BA8F-72DE0D16E955"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E033D129-9E35-4308-8B79-FD2DC3B11E26"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C1D14116-B6F1-4CB7-9DA3-A09D6C058EBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94BAE3A8-C6AB-49E6-BB38-DDEE98F89AC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E29BF94B-0F1B-4E5C-8DAF-5BBBCCBCF801"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E6E726D-5249-4FA9-9F51-37BF0DB0E4CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A7F9D18-9BD1-4228-8A10-1A4A748606E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE7892A2-3158-4D85-BB40-82786203B97B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89DED83D-408E-4F5E-8751-50EC23F99782"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "622DC5D0-C480-419A-8904-90C2BA0ACD55"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7749B9C9-72A5-47C7-B8F5-5AB11CD2B130"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B3608F78-F98C-4D43-9BBF-36C79FBB0EAC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.dell.com/support/article/SLN320101",
|
|
"source": "security_alert@emc.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |