René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

139 lines
4.6 KiB
JSON

{
"id": "CVE-2011-0890",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2011-03-25T18:55:01.450",
"lastModified": "2017-08-17T01:33:44.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HP Discovery & Dependency Mapping Inventory (DDMI) 7.50, 7.51, 7.60, 7.61, 7.70, and 9.30 launches the Windows SNMP service with its default configuration, which allows remote attackers to obtain potentially sensitive information or have unspecified other impact by leveraging the public read community."
},
{
"lang": "es",
"value": "HP Discovery & Dependency Mapping Inventory (DDMI) v7.50, v7.51, v7.60, v7.61, v7.70 y v9.30 inicia el servicio SNMP de Windows con su configuraci\u00f3n predeterminada, lo que permite a atacantes remotos obtener informaci\u00f3n sensible u otro impacto no especificado mediante el aprovechamiento de la lectura p\u00fablica de la comunidad."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.50:*:*:*:*:*:*:*",
"matchCriteriaId": "044B28F0-C1C5-4BE6-ADA7-28341024A1C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.51:*:*:*:*:*:*:*",
"matchCriteriaId": "146FFF61-C7B7-404C-9697-97AAF1138FAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "FD17A792-40FD-4032-8552-14464BAF93B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.61:*:*:*:*:*:*:*",
"matchCriteriaId": "839425E6-2DC4-44DE-99FA-8638B0DDC3DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.70:*:*:*:*:*:*:*",
"matchCriteriaId": "B180F4F2-6FC6-41AD-8134-80023F692F66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:9.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A5031736-4B2D-4861-A3DB-1467F212AB36"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=130082163516878&w=2",
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/8163",
"source": "hp-security-alert@hp.com"
},
{
"url": "http://securitytracker.com/id?1025239",
"source": "hp-security-alert@hp.com"
},
{
"url": "http://www.securityfocus.com/bid/46981",
"source": "hp-security-alert@hp.com"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0755",
"source": "hp-security-alert@hp.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66242",
"source": "hp-security-alert@hp.com"
}
]
}