René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

254 lines
9.5 KiB
JSON

{
"id": "CVE-2020-8607",
"sourceIdentifier": "security@trendmicro.com",
"published": "2020-08-05T14:15:13.530",
"lastModified": "2020-08-11T15:02:12.397",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad de comprobaci\u00f3n de entrada que se encuentra en varios productos de Trend Micro que usan una versi\u00f3n particular de un controlador de protecci\u00f3n de rootkit espec\u00edfico, podr\u00eda permitir a un atacante en modo usuario con permisos de administrador abusar del controlador para modificar una direcci\u00f3n del kernel que puede causar un bloqueo del sistema o potencialmente conllevar a una ejecuci\u00f3n de c\u00f3digo en modo kernel. Un atacante ya debe haber obtenido acceso de administrador en la m\u00e1quina de destino (leg\u00edtimamente o mediante un ataque no relacionado separado) para explotar esta vulnerabilidad"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:antivirus_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.62.1240",
"matchCriteriaId": "5225790C-66F3-438C-82A9-0567EA2D3EAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "AF019D2D-C426-4D2D-A254-442CE777B41E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD39638-1D52-4FA8-BBA0-305795D7D2E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:deep_security:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A741097B-4B1F-4541-8E81-ABAAB16F4CCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC7B6BD-BAF1-4E0D-9BFB-6A9BE7D3AC40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:deep_security:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81D6DD3F-6DA9-4D25-A0AB-8A2670A6FE91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:deep_security:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD405A-E3EA-48F8-AC3D-E45A666920C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*",
"matchCriteriaId": "64600B42-4884-41F2-A683-AE1EDB79372E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan_business_security:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B20A7619-A7A7-4048-BF27-5B2613DCF914"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan_business_security:9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "14329F60-1C5D-4A4C-BBCA-BD42FFB4FB73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "762313F8-2BA6-4ED7-A977-56C962D5B27F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan_business_security_service:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3FC1CA-FFB4-4838-9BCE-BB5CAC28505F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*",
"matchCriteriaId": "7D4FDFB7-9F82-47F2-B265-916BFCE0A0EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:officescan_cloud:16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C23A004A-B597-402D-BFA8-9EB11580B13F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:online_scan:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "388766C0-6983-453A-A1C2-8266127337C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:portable_security:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D33BDD31-422F-4DB0-B2DC-789611260C35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:portable_security:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "079E3712-9365-44F8-804B-2ADBD89C1D5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:rootkit_buster:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA0F265-BD68-41F7-99DD-8832EE7E295B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:safe_lock:-:*:*:*:txone:*:*:*",
"matchCriteriaId": "8549A2AA-5BDE-4B27-9861-9426769FAB0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:safe_lock:2.0:sp1:*:*:-:*:*:*",
"matchCriteriaId": "9B28CE37-C436-4440-B43F-905482D91AD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*",
"matchCriteriaId": "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*",
"matchCriteriaId": "82D38D59-9208-4101-89D8-367E53DA29D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*",
"matchCriteriaId": "7293D7E6-196E-4C9F-B107-77FB2E770A1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*",
"matchCriteriaId": "46FD65C7-6DED-47CA-988D-089E95D2F7B5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU99160193/index.html",
"source": "security@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://jvn.jp/vu/JVNVU99160193/",
"source": "security@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://success.trendmicro.com/jp/solution/000260748",
"source": "security@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://success.trendmicro.com/solution/000260713",
"source": "security@trendmicro.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}