René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

235 lines
8.8 KiB
JSON

{
"id": "CVE-2017-14388",
"sourceIdentifier": "security_alert@emc.com",
"published": "2017-11-13T17:29:00.537",
"lastModified": "2017-11-29T19:01:21.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cloud Foundry Foundation GrootFS release 0.3.x versions prior to 0.30.0 do not validate DiffIDs, allowing specially crafted images to poison the grootfs volume cache. For example, this could allow an attacker to provide an image layer that GrootFS would consider to be the Ubuntu base layer."
},
{
"lang": "es",
"value": "La distribuci\u00f3n GrootFS de Cloud Foundry Foundation GrootFS en versiones 0.3.x anteriores a la 0.30.0 no valida DiffIDs, permitiendo que im\u00e1genes especialmente manipuladas da\u00f1en la memoria cach\u00e9 del volumen de grootfs. Por ejemplo, esto podr\u00eda permitir que un atacante proporcione una capa de imagen que GrootFS considerar\u00eda que es la capa base de Ubuntu."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C45C9A7-1893-41C0-B223-CE52EB9BC89A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC40825D-0D84-473F-A773-A4BCD8ADD170"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B7A818-F04D-414D-A77D-DF6E94AB8DEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1E03D0A-99CE-4F24-A270-60D0B26C8E1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE254721-5886-4E34-A584-AE28076311BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E93FCC50-28B4-4583-894D-BF251011BAD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95145C1C-56A5-4618-B9B1-AE7A85C8A79C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D095614D-3618-4D2A-A549-209B4049695E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54412F2F-3010-417F-8CC4-AD15C2C8071E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAD5A48-35EB-4FE8-BE35-FFF54A245BA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D682F2-A07D-4A74-85FA-7EC7167F0A1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D289904-787F-4FDD-B47A-244605A0FE7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6FCDF2-B6E5-4B6A-9A94-44C51A0D2160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12CAAFF8-DC90-482A-BC21-8939457F5ACB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1D757F-ACEE-4FCB-B91F-879B2E9637C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEF0E08-9AF7-4F8D-84D3-171DD1F0C566"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "842FBDD9-0624-4446-951D-9C601F4F9ADC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB454D66-E728-408F-84DB-8C6846010A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "849E56E0-CE7F-4CB2-8D96-596F51A943DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "735C5982-6227-42B4-B055-AFF64148CDE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.24.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB90CD2-9DD6-4699-BEAF-9CAD0E5C6750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81FF68C-FD88-41D0-A94F-D656FC268DCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA6188A-D1E4-439E-BD97-818500CB2A22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.27.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C1195F98-3BAA-4AEB-B6E2-6021C686E7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.28.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81485A7B-111E-4134-A4EC-70964DAB7042"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.28.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8145EB-1C5C-4A2D-B0E2-C61BC453CF6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pivotal_software:grootfs:0.29.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D11AD9-0B68-4BA8-A2C5-1743D6A4F07D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cloudfoundry.org/cve-2017-14388/",
"source": "security_alert@emc.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}