René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
3.5 KiB
JSON

{
"id": "CVE-2015-5987",
"sourceIdentifier": "cret@cert.org",
"published": "2015-12-31T16:59:01.033",
"lastModified": "2015-12-31T20:03:15.680",
"vulnStatus": "Analyzed",
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/330.html\">CWE-330: Use of Insufficiently Random Values</a>",
"descriptions": [
{
"lang": "en",
"value": "Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting the ID value in the header of a DNS query, which makes it easier for remote attackers to spoof responses by predicting this value."
},
{
"lang": "es",
"value": "Dispositivos Belkin F9K1102 2 con firmware 2.10.17 utilizan un algoritmo indebido para seleccionar el valor ID en la cabecera de una consulta DNS, lo que hace m\u00e1s f\u00e1cil para atacantes remotos falsificar respuestas prediciendo este valor."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.50\\(aazi.0\\)c0",
"matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.50\\(aazi.0\\)c0",
"matchCriteriaId": "21D9999F-C55E-4BAB-A401-007FB34B2A5E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/201168",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}