René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

148 lines
4.4 KiB
JSON

{
"id": "CVE-2016-5329",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-29T09:59:00.227",
"lastModified": "2017-07-29T01:34:09.397",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "VMware Fusion 8.x before 8.5 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors."
},
{
"lang": "es",
"value": "VMware Fusion 8.x en versiones anteriores a 8.5 en OS X, cuando System Integrity Protection (SIP) est\u00e1 habilitado, permite a usuarios locales determinar las direcciones de memoria del kernel y eludir el mecanismo de protecci\u00f3n kASLR a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "25BBD4C7-C851-4D40-B6DD-92873319CD28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20453B9E-D3AD-403F-B1A5-FB3300FBB0C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6759F732-8E65-49F7-B46C-B1E3F856B11D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD345B3-810C-41D1-82CE-0CA0B4B1F5DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D91C182F-A8D2-4ABF-B202-261056EF93D1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/93888",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1037103",
"source": "cve@mitre.org"
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2016-0017.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}