René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

111 lines
3.7 KiB
JSON

{
"id": "CVE-2009-5150",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-05-11T19:29:00.220",
"lastModified": "2018-06-14T13:01:37.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Absolute Computrace Agent V80.845 and V80.866 does not have a digital signature for the configuration block, which allows attackers to set up communication with a web site other than the intended search.namequery.com site by modifying data within a disk's inter-partition space. This allows a privileged local user to execute arbitrary code even after that user loses access and all disk partitions are reformatted."
},
{
"lang": "es",
"value": "Absolute Computrace Agent V80.845 y V80.866 no tiene una firma digital para el bloque de configuraci\u00f3n, lo que permite que los atacantes establezcan comunicaciones con un sitio web distinto al sitio search.namequery.com planeado mediante la modificaci\u00f3n de datos en un espacio entre particiones de un disco. Esto permite que un usuario local privilegiado ejecute c\u00f3digo arbitrario incluso despu\u00e9s de que ese usuario pierda el acceso y se vuelvan a formatear todas las particiones del disco."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:computrace_agent:80.845:*:*:*:*:*:*:*",
"matchCriteriaId": "6668E864-2CDF-4BA1-BCA1-8A2FBD344D70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:computrace_agent:80.866:*:*:*:*:*:*:*",
"matchCriteriaId": "8C9FA7BE-1D37-4D8E-B640-C4C387F368DF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.coresecurity.com/system/files/publications/2016/05/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}