2023-11-07 21:03:21 +00:00

134 lines
4.7 KiB
JSON

{
"id": "CVE-2017-17482",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-07T15:29:00.223",
"lastModified": "2023-11-07T02:41:43.390",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenVMS through V8.4-2L2 on Alpha and through V8.4-2L1 on IA64, and VAX/VMS 4.0 and later. A malformed DCL command table may result in a buffer overflow allowing a local privilege escalation when a non-privileged account enters a crafted command line. This bug is exploitable on VAX and Alpha and may cause a process crash on IA64. Software was affected regardless of whether it was directly shipped by VMS Software, Inc. (VSI), HPE, HP, Compaq, or Digital Equipment Corporation."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en OpenVMS hasta al versi\u00f3n V8.4-2L2 en Alpha y hasta V8.4-2L1 en IA64, y en VAX/VMS en versiones 4.0 y posteriores. Una tabla de comandos DCL mal formada podr\u00eda resultar en un desbordamiento de b\u00fafer que permitir\u00eda un escalado de privilegios local cuando una cuenta no privilegiada introduce una l\u00ednea de comandos manipulada. Este error se puede explotar en VAX y Alpha y podr\u00eda provocar un cierre inesperado del proceso en IA64. El software se ha visto afectado independientemente de si ha sido distribuido directamente por VMS Software, Inc. (VSI), HPE, HP, Compaq o Digital Equipment Corporation."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:openvms:*:*:*:*:alpha:*:*:*",
"versionEndIncluding": "8.4-2l1",
"matchCriteriaId": "5F922203-A85E-42A0-B60B-72D3BCCB3B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:openvms:*:*:*:*:ia64:*:*:*",
"versionEndIncluding": "8.4-2l1",
"matchCriteriaId": "E60E251F-CAC3-487F-B092-B1981263A9EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:openvms:*:*:*:*:vax:*:*:*",
"versionStartIncluding": "4.0",
"matchCriteriaId": "2738F42A-F8EE-416A-8CB5-EC1C3E480E14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:openvms:*:*:*:*:vms:*:*:*",
"versionStartIncluding": "4.0",
"matchCriteriaId": "C5D51861-4CB9-4738-ACF7-A06990924F2C"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openvms.org/node/121",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://groups.google.com/forum/#%21topic/comp.os.vms/BYIUQ0lJ-s0",
"source": "cve@mitre.org"
},
{
"url": "https://www.theregister.co.uk/2018/02/06/openvms_vulnerability/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}