mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
170 lines
5.7 KiB
JSON
170 lines
5.7 KiB
JSON
{
|
|
"id": "CVE-2008-4545",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-10-13T20:00:02.463",
|
|
"lastModified": "2017-08-08T01:32:44.123",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8 uses weak permissions for the D:\\CommServer\\Reports directory, which allows remote authenticated users to obtain sensitive information by reading files in this directory."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cisco Unity v4.x anteriores a v4.2(1)ES161, v5.x anteriores a v5.0(1)ES53, and v7.x anteriores a v7.0(2)ES8 usa permisos d\u00e9biles para el directorio D:\\CommServer\\Reports directory, lo que permite a usuarios remotos autentificados conseguir informaci\u00f3n sensible, leyendo ficheros en este directorio. \r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.2\\(1\\)",
|
|
"matchCriteriaId": "E0008B2C-C3EF-4C4F-AE0F-BFC2C373D68B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.0\\(1\\)",
|
|
"matchCriteriaId": "FDD69DB2-FD94-403D-BD18-A25FD470C817"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "7.0\\(2\\)",
|
|
"matchCriteriaId": "049041BD-EBC5-4971-BD51-DD63EFB2F430"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7069DF8-3006-4651-816A-855C980256FA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDE9975D-17B0-4EC8-8278-A715F4BF14F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(2\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9555A7EC-C0B6-4F48-99BE-BCE51446CF47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(3\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "16F3E72C-FF4B-425E-A8FB-C1C4BEDDB019"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(3\\):sr2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6871C23B-9B4F-4621-A1C9-55D040558610"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(4\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A164F687-98DB-409D-A9C4-D04ECF6DD53F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(4\\):sr1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "255CAB12-EE1D-4DC3-B854-E0D645F4C9B8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.0\\(5\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A9BA9FD-99EC-4571-ACE8-2EFD13EFEBC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:4.1\\(1\\):*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B746D68B-C6A4-494C-9302-F4652E1E2A13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "20DAD5D8-6882-48FE-AE7A-9440F47F6C2A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:cisco:unity:7.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EED32D3-A1C5-430C-8488-4D221196CB76"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securitytracker.com/id?1021022",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/31642",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.voipshield.com/research-details.php?id=130",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/2771",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45742",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |