mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
126 lines
4.5 KiB
JSON
126 lines
4.5 KiB
JSON
{
|
|
"id": "CVE-2006-3697",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-07-21T14:03:00.000",
|
|
"lastModified": "2018-10-18T16:48:58.037",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the \"open folder\" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the \"Save Configuration As\" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Agnitum Outpost Firewall Pro 3.51.759.6511 (462), tal y como se usa en (1) Lavasoft Personal Firewall 1.0.543.5722 (433) y (2) Novell BorderManager Novell Client Firewall 2.0, no restringe de forma adecuada las actividades de usuario para ganar privilegios y ejecutar comandos (a)a trav\u00e9s de la opci\u00f3n \"abrir carpeta\" cuando una instancia de explorer.exe est\u00e1 funcionando, posiblemente relacionado con la funci\u00f3n API ShellExecute, o (b) a trav\u00e9s de la re-escritura de un fichero de proceso por lotes a trav\u00e9s de la opci\u00f3n \"Guardar configuraci\u00f3n como\". NOTA: esto podr\u00eda estar relacionado con la vulnerabilidad en Microsoft Windows y la instnacia explorer.exe del firewall."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:agnitum:outpost_firewall:3.51.759.6511:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D53F7EA-FC12-44AB-8DE8-035E4BD8AE7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lavasoft:lavasoft_personal_firewall:1.0.543.5722.433:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF1090AA-5A26-4600-B284-37D714AD28D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:novell:client_firewall:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "45A29B4A-377D-4264-ABD1-6A14C9BDBC7D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.ben.goulding.com.au/secad.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/440426/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/19018",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/19024",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/2851",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/2852",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/0144",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://secure-support.novell.com/KanisaPlatform/Publishing/903/3762108_f.SAL_Public.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |