René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

121 lines
4.4 KiB
JSON

{
"id": "CVE-2017-3582",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2017-04-24T19:59:05.440",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle SuperCluster Specific Software component of Oracle Sun Systems Products Suite (subcomponent: Backup/Restore Utility). Supported versions that are affected are 2.3.8 and 2.3.13. Easily \"exploitable\" vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle SuperCluster Specific Software executes to compromise Oracle SuperCluster Specific Software. Successful attacks of this vulnerability can result in takeover of Oracle SuperCluster Specific Software. CVSS 3.0 Base Score 8.4 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el componente Oracle SuperCluster Specific Software de Oracle Sun Systems Products Suite (subcomponente: Backup/Restore Utility). Versiones compatibles que son afectadas son 2.3.8 y 2.3.13. Vulnerabilidad f\u00e1cilmente explotable permite a atacante no autenticado login en la infrastructure donde Oracle SuperCluster Specific Software ejecuta para comprometer el software espec\u00edfico de Oracle SuperCluster. Los ataques exitosos de esta vulnerabilidad pueden resultar en la adquisici\u00f3n del software espec\u00edfico de Oracle SuperCluster.. CVSS 3.0 Base Score 8.4 (Confidencialidad, Integridad y Impactos de disponibilidad). Vector CVSS: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:supercluster_specific_software:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "94B9E712-3BC6-4C9A-91B2-A0611B600E40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:supercluster_specific_software:2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "83DBBE90-19EE-4754-A43F-5AEDB906F986"
}
]
}
]
}
],
"references": [
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/97796",
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securitytracker.com/id/1038292",
"source": "secalert_us@oracle.com"
}
]
}