René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
3.8 KiB
JSON

{
"id": "CVE-2015-3324",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-04-16T23:59:05.540",
"lastModified": "2016-12-06T02:59:55.667",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 does not validate server certificates during an \"encrypted remote KVM session,\" which allows man-in-the-middle attackers to spoof servers."
},
{
"lang": "es",
"value": "ThinkServer System Manager (TSM) Baseboard Management Controller anterior a firmware 1.27.73476 para ThinkServer RD350, RD450, RD550, RD650, y TD350 no valida los certificados de servidores durante una 'sesi\u00f3n KVM remota codificada,' lo que permite a atacantes man-in-the-middle falsificar servidores."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:lenovo:thinkserver_system_manager_baseboard_management_controller_firmware:118.71532:*:*:*:*:*:*:*",
"matchCriteriaId": "8503502C-DE2B-4ABB-A0F5-5854AB3E4CBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:lenovo:thinkserver_rd350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A988370E-47F4-4DC3-91AB-025360D07160"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:lenovo:thinkserver_rd450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B994FC89-D6B6-4191-BC53-A36211DE94F8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:lenovo:thinkserver_rd550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDCBFD8-D031-4034-AEF9-6F31CC1C5814"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:lenovo:thinkserver_rd650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2211D4D-0EB0-4E15-83D5-E94138D68284"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:lenovo:thinkserver_td350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83BDBAD4-5483-4D37-A727-D5FE876FF26E"
}
]
}
]
}
],
"references": [
{
"url": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74199",
"source": "cve@mitre.org"
}
]
}