René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.3 KiB
JSON

{
"id": "CVE-2018-5202",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2018-12-21T16:29:00.287",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SKCertService 2.5.5 and earlier contains a vulnerability that could allow remote attacker to execute arbitrary code. This vulnerability exists due to the way .dll files are loaded by SKCertService. It allows an attacker to load a .dll of the attacker's choosing that could execute arbitrary code without the user's knowledge."
},
{
"lang": "es",
"value": "SKCertService, en versiones 2.5.5 y anteriores, tiene una vulnerabilidad que podr\u00eda permitir que un atacante ejecute c\u00f3digo arbitrario. Esta vulnerabilidad existe debido a la forma en la que SKCertService carga los archivos .dll. Permite que un atacante cargue un .dll escogido por el atacante que pueda ejecutar c\u00f3digo arbitrario sin que el usuario lo sepa."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:signkorea:skcertservice:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.5",
"matchCriteriaId": "4D86A780-DA30-4A44-A728-D085DFE6E773"
}
]
}
]
}
],
"references": [
{
"url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=30119",
"source": "vuln@krcert.or.kr",
"tags": [
"Third Party Advisory"
]
}
]
}