mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
130 lines
4.1 KiB
JSON
130 lines
4.1 KiB
JSON
{
|
|
"id": "CVE-2008-1056",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-02-28T19:44:00.000",
|
|
"lastModified": "2017-08-08T01:29:51.323",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple stack-based buffer overflows in Symark PowerBroker 2.8 through 5.0.1 allow local users to gain privileges via a long argv[0] string when executing (1) pbrun, (2) pbsh, or (3) pbksh. NOTE: the product is often installed in environments with trust relationships that facilitate subsequent remote compromises."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en Symark PowerBroker de 2.8 a 5.0.1 permiten a usuarios locales obtener privilegios a trav\u00e9s de una cadena argv[0] larga cuando se ejecuta 1) pbrun, (2) pbsh, o (3) pbksh. NOTA: el producto a veces se instala en entornos con relaciones de confianza que facilitan compromisos de subsecuencia remota."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.9
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F16E3B69-F425-4FAB-9201-2CF0590016B5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16AB3CBC-A6A6-487D-A530-9E45B4BFDD9D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FD7ADE8D-CC82-4BB7-9BA1-90DCBE7DFC0A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:3.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47E587CF-6F19-4BB1-8C30-577D4F1D6DEF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B255DD3-556A-4B77-8479-062E841EED10"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0131FCF9-69F4-46DA-8A6B-81FB722170BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:symark:powerbroker:5.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D8BED834-E613-423A-82F7-A2E0FF158641"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.mnin.org/advisories/2008_symarkpb.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/28015",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.symark.com/support/PBFeb2008Announcement.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40872",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |