René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

126 lines
3.9 KiB
JSON

{
"id": "CVE-2015-2864",
"sourceIdentifier": "cret@cert.org",
"published": "2015-09-21T10:59:00.100",
"lastModified": "2016-12-07T18:10:48.753",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Retrospect and Retrospect Client before 10.0.2.119 on Windows, before 12.0.2.116 on OS X, and before 10.0.2.104 on Linux improperly generate password hashes, which makes it easier for remote attackers to bypass authentication and obtain access to backup files by leveraging a collision."
},
{
"lang": "es",
"value": "Vulnerabilidad en Retrospect y Retrospect Client en versiones anteriores a 10.0.2.119 en Windows, en versiones anterioresa 12.0.2.116 en OS X y en versiones anteriores a 10.0.2.104 en Linux, genera indebidamente hashes de contrase\u00f1a, lo que hace m\u00e1s f\u00e1cil para atacantes remotos eludir la autenticaci\u00f3n y obtener acceso a los archivos de copia de seguridad mediante el aprovechamiento de una colisi\u00f3n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:retrospect:retrospect:10.0.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "F0D942BA-5CB8-4428-B9F9-477CEF95F305"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:retrospect:retrospect:12.0.2:*:*:*:*:mac:*:*",
"matchCriteriaId": "F0D24914-4CFC-4308-ABCE-41257B297481"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:retrospect:retrospect_client:10.0.2:*:*:*:*:linux:*:*",
"matchCriteriaId": "67779501-A19B-41A9-92C9-DE01072EB5A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:retrospect:retrospect_client:10.0.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "584D8E51-0FA8-45CB-B982-40F5B0AB36C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:retrospect:retrospect_client:12.0.2:*:*:*:*:mac:*:*",
"matchCriteriaId": "CEF6B991-A24F-48BF-BFEC-A592A04A8619"
}
]
}
]
}
],
"references": [
{
"url": "http://www.kb.cert.org/vuls/id/101500",
"source": "cret@cert.org",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
},
{
"url": "http://www.retrospect.com/support/kb/cve_2015_2864",
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75201",
"source": "cret@cert.org"
},
{
"url": "http://www.securitytracker.com/id/1033948",
"source": "cret@cert.org"
},
{
"url": "https://www.youtube.com/watch?v=MB8AL5u7JCA",
"source": "cret@cert.org",
"tags": [
"Exploit"
]
}
]
}