René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
3.9 KiB
JSON

{
"id": "CVE-2017-15530",
"sourceIdentifier": "secure@symantec.com",
"published": "2017-12-13T19:29:00.283",
"lastModified": "2017-12-27T15:59:42.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Prior to 4.4.1.10, the Norton Family Android App can be susceptible to an Information Disclosure issue. Information disclosure is a very common issue that attackers will attempt to exploit as a first pass across the application. As they probe the application they will take note of anything that may seem out of place or any bit of information they can use to their advantage such as error messages, system information, user data, version numbers, component names, URL paths, or even simple typos and misspellings."
},
{
"lang": "es",
"value": "Antes de la versi\u00f3n 4.4.1.10, Norton Family Android App puede ser susceptible a un problema de filtrado de informaci\u00f3n. El filtrado de informaci\u00f3n es un problema muy com\u00fan que los atacantes intentar\u00e1n explotar como un primer paso en la aplicaci\u00f3n. Mientras sondean la aplicaci\u00f3n, tomar\u00e1n nota de cualquier cosa que parezca estar fuera de lugar o de cualquier tipo de informaci\u00f3n que pueden utilizar a su favor, como los mensajes de error, informaci\u00f3n del sistema, datos de usuario, n\u00fameros de versi\u00f3n, nombres de componentes, rutas de URL o, incluso, simples erratas y faltas de ortograf\u00eda."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symantec:norton_family:*:*:*:*:*:android:*:*",
"versionEndExcluding": "4.4.1.10",
"matchCriteriaId": "11181A75-E828-474B-9315-0A5F16D13A38"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/102120",
"source": "secure@symantec.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20171213_00",
"source": "secure@symantec.com",
"tags": [
"Vendor Advisory"
]
}
]
}