René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
4.9 KiB
JSON

{
"id": "CVE-2018-0624",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2018-09-07T14:29:00.490",
"lastModified": "2018-10-30T17:34:15.533",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier, Yayoi Hanbai 17 Series Ver.20.0.2 and earlier, and Yayoi Kokyaku Kanri 17 Ver.11.0.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. This flaw exists within the handling of ykkapi.dll loaded by the vulnerable products."
},
{
"lang": "es",
"value": "Vulnerabilidad de ruta de b\u00fasqueda no fiable en m\u00faltiples productos Yayoi 17 Series (Yayoi Kaikei 17 Series Ver.23.1.1 y anteriores, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 y anteriores, Yayoi Kyuuyo 17 Ver.20.1.4 y anteriores, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 y anteriores, Yayoi Hanbai 17 Series Ver.20.0.2 y anteriores y Yayoi Kokyaku Kanri 17 Ver.11.0.2 y anteriores) permite que un atacante obtenga privilegios mediante un DLL troyano en un directorio sin especificar. Este error existe en el manejo de ykkapi.dll cargado por los productos vulnerables."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yayoi-kk:aoiro_shinkoku:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.1.1",
"matchCriteriaId": "DC9BFB2D-66C9-4C25-90E6-E1DAE1834D7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yayoi-kk:hanbai:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.0.2",
"matchCriteriaId": "1F879E6B-1C1A-4A19-A73C-7CCE422DBDCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yayoi-kk:kaikei:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.1.1",
"matchCriteriaId": "EE58A245-C499-45EC-B155-C79868CAB652"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yayoi-kk:kokyaku_kanri:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.0.2",
"matchCriteriaId": "C5320727-E4F1-4736-9F6F-54D01B1225C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yayoi-kk:kyuuyo:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.1.4",
"matchCriteriaId": "30A74833-B37A-42C2-81D7-DAE84DA13003"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yayoi-kk:kyuuyo_keisan:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.1.4",
"matchCriteriaId": "B9EBE469-879C-41EC-8040-4B076330B6AC"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN06813756/index.html",
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}