mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
139 lines
4.5 KiB
JSON
139 lines
4.5 KiB
JSON
{
|
|
"id": "CVE-2021-35449",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-07-19T15:15:07.780",
|
|
"lastModified": "2021-09-20T12:21:54.517",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Lexmark Universal Print Driver version 2.15.1.0 and below, G2 driver 2.7.1.0 and below, G3 driver 3.2.0.0 and below, and G4 driver 4.2.1.0 and below are affected by a privilege escalation vulnerability. A standard low priviliged user can use the driver to execute a DLL of their choosing during the add printer process, resulting in escalation of privileges to SYSTEM."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El Lexmark Universal Print Driver versi\u00f3n 2.15.1.0 e inferior, driver versi\u00f3n G2 2.7.1.0 e inferior, G3 driver versi\u00f3n 3.2.0.0 e inferior y G4 driver versi\u00f3n 4.2.1.0 e inferior est\u00e1n afectados por una vulnerabilidad de escalada de privilegios. Un usuario est\u00e1ndar poco privilegiado puede usar el controlador para ejecutar una DLL de su elecci\u00f3n durante el proceso de adici\u00f3n de la impresora, resultando en una escalada de privilegios a SYSTEM"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-732"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lexmark:g2_driver:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.7.1.0",
|
|
"matchCriteriaId": "3CD526E8-73A3-4D76-9658-A323DC6920F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lexmark:g3_driver:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.0.0",
|
|
"matchCriteriaId": "4ED1BEA9-FF02-47B2-A8BE-AD01098849C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lexmark:g4_driver:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2.1.0",
|
|
"matchCriteriaId": "724C5598-AC84-46EA-A972-6F4BA850D154"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lexmark:universal_print_driver:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.15.1.0",
|
|
"matchCriteriaId": "3C7C6DB5-C1A8-417D-8E21-501F4FD26254"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/163811/Lexmark-Driver-Privilege-Escalation.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory",
|
|
"VDB Entry"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://support.lexmark.com/alerts/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://raw.githubusercontent.com/jacob-baines/vuln_disclosure/main/vuln_2021_02.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |