René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

193 lines
7.4 KiB
JSON

{
"id": "CVE-2008-3539",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-09-11T01:12:57.853",
"lastModified": "2017-08-08T01:31:58.043",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in HP OpenView Select Identity (HPSI) Connectors on Windows, as used in HPSI Active Directory Connector 2.30 and earlier, HPSI SunOne Connector 1.14 and earlier, HPSI eDirectory Connector 1.12 and earlier, HPSI eTrust Connector 1.02 and earlier, HPSI OID Connector 1.02 and earlier, HPSI IBM Tivoli Dir Connector 1.02 and earlier, HPSI TOPSecret Connector 2.22.001 and earlier, HPSI RACF Connector 1.12.001 and earlier, HPSI ACF2 Connector 1.02 and earlier, HPSI OpenLDAP Connector 1.02 and earlier, and HPSI BiDir DirX Connector 1.00.003 and earlier, allows local users to obtain sensitive information via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en HP OpenView Select Identity (HPSI) Connectors sobre Windows, utilizado en HPSI Active Directory Connector 2.30 y anteriores, HPSI SunOne Connector 1.14 y anteriores, HPSI eDirectory Connector 1.12 y anteriores, HPSI eTrust Connector 1.02 y anteriores, HPSI OID Connector 1.02 y anteriores, HPSI IBM Tivoli Dir Connector 1.02 y anteriores, HPSI TOPSecret Connector 2.22.001 y anteriores, HPSI RACF Connector 1.12.001 y anteriores, HPSI ACF2 Connector 1.02 y anteriores, HPSI OpenLDAP Connector 1.02 y anteriores, and HPSI BiDir DirX Connector 1.00.003 y anteriores, permite a ausuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_acf2_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "2ADE02FF-E7E9-421D-BB22-F8F0523042DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_active_directory_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.70.003",
"matchCriteriaId": "C9ACA531-E06C-4494-8E5D-694433316DBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_active_directory_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.10.002",
"matchCriteriaId": "67B9BAB4-4BE9-401B-93CB-1060D9DA58CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_active_directory_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.20",
"matchCriteriaId": "4E963EBC-C8BD-4308-A8E1-1752A9C3636E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_active_directory_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.30",
"matchCriteriaId": "0AAEE616-803B-4DA6-83BB-F8492242FB0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_bidir_dirx_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.00.003",
"matchCriteriaId": "04BCD03A-532D-4CD1-AD29-10976C3A3CF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_edirectory_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.12",
"matchCriteriaId": "E3338660-1EAE-4B48-9F0C-953D5118E80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_etrust_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "5E27C72C-6424-40CB-8917-16171ADCE94F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_oid_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "87DDF395-56F8-47C3-9BC9-732753264763"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_openldap_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "3BE6B800-0DC9-46C5-BE8C-A9C30C68C5BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_racf_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.12.001",
"matchCriteriaId": "BD712946-8B98-495E-AC83-DA897ED15D46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_sunone_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.14",
"matchCriteriaId": "4E61EBB8-B01B-4940-9778-6EC3CC9FEC73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:hpsi_topsecret_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.22.001",
"matchCriteriaId": "2FE48EC3-A4C7-439A-8719-392652668087"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:ibm_tivoli_dir_connector:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.02",
"matchCriteriaId": "ECC89FFF-169B-42B5-AB16-577F32C13EC5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=122062779731581&w=2",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://securityreason.com/securityalert/4236",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1020821",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/31024",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2501",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44916",
"source": "cve@mitre.org"
}
]
}