2024-12-08 03:06:42 +00:00

145 lines
4.3 KiB
JSON

{
"id": "CVE-2007-0434",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-01-23T02:28:00.000",
"lastModified": "2024-11-21T00:25:51.473",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BEA AquaLogic Enterprise Security 2.0 through 2.0 SP2, 2.1 through 2.1 SP1, and 2.2 does not properly set the severity level of audit events when the system load is high, which might make it easier for attackers to avoid detection."
},
{
"lang": "es",
"value": "BEA AquaLogic Enterprise Security 2.0 hasta 2.0 SP2, 2.1 hasta 2.1 SP1, y 2.2 no configura adecuadamente el nivel de seguridad de los eventos de auditor\u00eda cuando la carga del sistema es alta, lo cual podr\u00eda facilitar a los atacantes evitar la detecci\u00f3n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:aqualogic_enterprise_security:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "39607EDB-12F7-45CA-8077-155DF4664253"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:aqualogic_enterprise_security:2.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "98D2EEE3-A7A3-4DE6-9222-9BEC05154A4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:aqualogic_enterprise_security:2.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "B5BA96F7-55CF-44F9-99BC-6A96B061D028"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:aqualogic_enterprise_security:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3528A55-CEEE-474A-8D03-4CC8E18C92A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:aqualogic_enterprise_security:2.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "362C3136-A17A-4279-8878-9419F41A2B37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:aqualogic_enterprise_security:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CD07BCE0-368F-4019-941E-B97A97FFFE53"
}
]
}
]
}
],
"references": [
{
"url": "http://dev2dev.bea.com/pub/advisory/220",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/32860",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/23786",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/22082",
"source": "cve@mitre.org"
},
{
"url": "http://dev2dev.bea.com/pub/advisory/220",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/32860",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/23786",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/22082",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}